CVE-2026-28417
EUVD-2026-908527.02.2026, 22:16
Vim is an open source, command line text editor. Prior to version 9.2.0073, an OS command injection vulnerability exists in the `netrw` standard plugin bundled with Vim. By inducing a user to open a crafted URL (e.g., using the `scp://` protocol handler), an attacker can execute arbitrary shell commands with the privileges of the Vim process. Version 9.2.0073 fixes the issue.
Affected Products (NVD)
| Vendor | Product | Version |
|---|---|---|
| vim | vim | 𝑥 < 9.2.0073 |
𝑥
= Vulnerable software versions
Debian Releases
Common Weakness Enumeration
- CWE-86 - Improper Neutralization of Invalid Characters in Identifiers in Web PagesThe software does not neutralize or incorrectly neutralizes invalid characters or byte sequences in the middle of tag names, URI schemes, and other identifiers.
- CWE-78 - Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')The software constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
Vulnerability Media Exposure