CVE-2026-41411

Published: April 24, 2026Last modified: April 26, 2026

Description

Vim is an open source, command line text editor. Prior to 9.2.0357, A command injection vulnerability exists in Vim's tag file processing. When resolving a tag, the filename field from the tags file is passed through wildcard expansion to resolve environment variables and wildcards. If the filename field contains backtick syntax (e.g., `command`), Vim executes the embedded command via the system shell with the full privileges of the running user.

Severity score breakdown

ParameterValue
Base score6.6
Attack VectorLOCAL
Attack complexityLOW
Privileges requiredNONE
User interactionREQUIRED
ScopeUNCHANGED
ConfidentialityLOW
Integrity impactHIGH
Availability impactLOW
VectorCVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:L

Status

ProductReleasePackageStatus
Alpaquita Linux23 LTSvimFixed (9.2.0357-r0)
25 LTSvimFixed (9.2.0357-r0)
StreamvimFixed (9.2.0357-r0)

References

ON THIS PAGE