CVE-2026-34982
EUVD-2026-1931306.04.2026, 16:16
Vim is an open source, command line text editor. Prior to version 9.2.0276, a modeline sandbox bypass in Vim allows arbitrary OS command execution when a user opens a crafted file. The `complete`, `guitabtooltip` and `printheader` options are missing the `P_MLE` flag, allowing a modeline to be executed. Additionally, the `mapset()` function lacks a `check_secure()` call, allowing it to be abused from sandboxed expressions. Commit 9.2.0276 fixes the issue.
Affected Products (NVD)
| Vendor | Product | Version |
|---|---|---|
| vim | vim | 𝑥 < 9.2.0276 |
𝑥
= Vulnerable software versions
Debian Releases
openSUSE / SLES Releases
openSUSE Product | |||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| gvim |
| ||||||||||||||||||||
| vim |
| ||||||||||||||||||||
| vim-data |
| ||||||||||||||||||||
| vim-data-common |
| ||||||||||||||||||||
| vim-small |
|
Red Hat Enterprise Linux Releases
Red Hat Product | |||||
|---|---|---|---|---|---|
| vim-X11 |
| ||||
| vim-common |
| ||||
| vim-enhanced |
| ||||
| vim-filesystem |
| ||||
| vim-minimal |
|
Vulnerability Media Exposure