CVE-2026-34714
Published: March 31, 2026Last modified: March 31, 2026
Description
Vim before 9.2.0272 allows code execution that happens immediately upon opening a crafted file in the default configuration, because %{expr} injection occurs with tabpanel lacking P_MLE.
Severity score breakdown
| Parameter | Value |
|---|---|
| Base score | 8.6 |
| Attack Vector | LOCAL |
| Attack complexity | LOW |
| Privileges required | NONE |
| User interaction | REQUIRED |
| Scope | CHANGED |
| Confidentiality | HIGH |
| Integrity impact | HIGH |
| Availability impact | HIGH |
| Vector | CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H |
Status
| Product | Release | Package | Status |
|---|---|---|---|
| Alpaquita Linux | 23 LTS | vim | Fixed (9.2.0272-r0) |
| 25 LTS | vim | Fixed (9.2.0272-r0) | |
| Stream | vim | Vulnerable (9.0.1395-r0) |
References
- http://www.openwall.com/lists/oss-security/2026/04/02/4
- http://www.openwall.com/lists/oss-security/2026/04/02/5
- https://github.com/vim/vim/commit/664701eb7576edb7c7c7d9f2d600815ec1f43459
- https://github.com/vim/vim/releases/tag/v9.2.0272
- https://github.com/vim/vim/security/advisories/GHSA-2gmj-rpqf-pxvh
- https://www.openwall.com/lists/oss-security/2026/03/30/3