PT-2026-41308 · Vim · Vim
Published
2026-05-15
·
Updated
2026-05-15
·
CVE-2026-46483
CVSS v3.1
3.6
Low
| Vector | AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N |
Vim is an open source, command line text editor. Prior to 9.2.0479, a command injection vulnerability exists in tar#Vimuntar() in
runtime/autoload/tar.vim when decompressing .tgz archives on Unix-like systems. The function builds :!gunzip and :!gzip -d commands using shellescape(tartail) without the {special} flag, allowing a crafted archive filename to trigger Vim cmdline-special expansion and execute shell commands in the user's context. This vulnerability is fixed in 9.2.0479.
Fix
Argument Injection
OS Command Injection
Found an issue in the description? Have something to add? Feel free to write us 👾
Related Identifiers
Affected Products
Vim