CVE-2026-39881
Published: April 9, 2026Last modified: April 9, 2026
Description
Vim is an open source, command line text editor. Prior to 9.2.0316, a command injection vulnerability in Vim's netbeans interface allows a malicious netbeans server to execute arbitrary Ex commands when Vim connects to it, via unsanitized strings in the defineAnnoType and specialKeys protocol messages. This vulnerability is fixed in 9.2.0316.
Severity score breakdown
| Parameter | Value |
|---|---|
| Base score | 5 |
| Attack Vector | LOCAL |
| Attack complexity | HIGH |
| Privileges required | LOW |
| User interaction | REQUIRED |
| Scope | UNCHANGED |
| Confidentiality | LOW |
| Integrity impact | HIGH |
| Availability impact | NONE |
| Vector | CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:H/A:N |
Status
| Product | Release | Package | Status |
|---|---|---|---|
| Alpaquita Linux | 23 LTS | vim | Fixed (9.2.0321-r0) |
| 25 LTS | vim | Fixed (9.2.0321-r0) | |
| Stream | vim | Fixed (9.2.0321-r0) |