CVE-2026-28417

high

Description

Vim is an open source, command line text editor. Prior to version 9.2.0073, an OS command injection vulnerability exists in the `netrw` standard plugin bundled with Vim. By inducing a user to open a crafted URL (e.g., using the `scp://` protocol handler), an attacker can execute arbitrary shell commands with the privileges of the Vim process. Version 9.2.0073 fixes the issue.

References

https://github.com/vim/vim/security/advisories/GHSA-m3xh-9434-g336

https://github.com/vim/vim/releases/tag/v9.2.0073

https://github.com/vim/vim/commit/79348dbbc09332130f4c860

http://www.openwall.com/lists/oss-security/2026/02/27/6

Details

Source: Mitre, NVD

Published: 2026-02-27

Updated: 2026-03-03

Risk Information

CVSS v2

Base Score: 7.2

Vector: CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C

Severity: High

CVSS v3

Base Score: 7.8

Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Severity: High

EPSS

EPSS: 0.00076