CVE-2026-34982

Published: April 4, 2026Last modified: April 7, 2026

Description

Vim is an open source, command line text editor. Prior to version 9.2.0276, a modeline sandbox bypass in Vim allows arbitrary OS command execution when a user opens a crafted file. The `complete`, `guitabtooltip` and `printheader` options are missing the `P_MLE` flag, allowing a modeline to be executed. Additionally, the `mapset()` function lacks a `check_secure()` call, allowing it to be abused from sandboxed expressions. Commit 9.2.0276 fixes the issue.

Severity score breakdown

ParameterValue
Base score8.2
Attack VectorLOCAL
Attack complexityLOW
Privileges requiredNONE
User interactionREQUIRED
ScopeCHANGED
ConfidentialityHIGH
Integrity impactHIGH
Availability impactNONE
VectorCVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N

Status

ProductReleasePackageStatus
Alpaquita Linux23 LTSvimFixed (9.2.0280-r0)
25 LTSvimFixed (9.2.0280-r0)
StreamvimFixed (9.2.0291-r0)

References

ON THIS PAGE