PT-2026-35033 · Vim · Vim
Published
2026-04-24
·
Updated
2026-04-24
·
CVE-2026-41411
CVSS v3.1
6.6
Medium
| AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:L |
Vim is an open source, command line text editor. Prior to 9.2.0357, A command injection vulnerability exists in Vim's tag file processing. When resolving a tag, the filename field from the tags file is passed through wildcard expansion to resolve environment variables and wildcards. If the filename field contains backtick syntax (e.g.,
command), Vim executes the embedded command via the system shell with the full privileges of the running user.Fix
OS Command Injection
Found an issue in the description? Have something to add? Feel free to write us 👾
Weakness Enumeration
Related Identifiers
Affected Products
Vim