CVE-2026-33412

high

Description

Vim is an open source, command line text editor. Prior to version 9.2.0202, a command injection vulnerability exists in Vim's glob() function on Unix-like systems. By including a newline character (\n) in a pattern passed to glob(), an attacker may be able to execute arbitrary shell commands. This vulnerability depends on the user's 'shell' setting. This issue has been patched in version 9.2.0202.

References

https://github.com/vim/vim/security/advisories/GHSA-w5jw-f54h-x46c

https://github.com/vim/vim/releases/tag/v9.2.0202

https://github.com/vim/vim/commit/645ed6597d1ea896c712cd7ddbb6edee79577e9a

http://www.openwall.com/lists/oss-security/2026/03/19/10

Details

Source: Mitre, NVD

Published: 2026-03-24

Updated: 2026-03-25

Risk Information

CVSS v2

Base Score: 6.8

Vector: CVSS2#AV:L/AC:L/Au:S/C:C/I:C/A:C

Severity: Medium

CVSS v3

Base Score: 7.3

Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H

Severity: High

EPSS

EPSS: 0.0005