PT-2026-35033 · Vim · Vim

Published

2026-04-24

·

Updated

2026-04-24

·

CVE-2026-41411

CVSS v3.1

6.6

Medium

AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:L
Vim is an open source, command line text editor. Prior to 9.2.0357, A command injection vulnerability exists in Vim's tag file processing. When resolving a tag, the filename field from the tags file is passed through wildcard expansion to resolve environment variables and wildcards. If the filename field contains backtick syntax (e.g., command), Vim executes the embedded command via the system shell with the full privileges of the running user.

Fix

OS Command Injection

Weakness Enumeration

Related Identifiers

CVE-2026-41411

Affected Products

Vim