« List of all CVEs

CVE-2026-41411

Vim: Command injection via backtick expansion in tag filenames

Published: 4/24/2026 Last updated: 4/28/2026 Reserved: 4/20/2026

Vim is an open source, command line text editor. Prior to 9.2.0357, A command injection vulnerability exists in Vim's tag file processing. When resolving a tag, the filename field from the tags file is passed through wildcard expansion to resolve environment variables and wildcards. If the filename field contains backtick syntax (e.g., `command`), Vim executes the embedded command via the system shell with the full privileges of the running user.

CNA assigner: GitHub_M (a0819718-46f1-4df5-94e2-005712e83aaa) Requested by: n/a

Metrics

Version Score Severity Vector String
3.1 6.6 Medium CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:L

Opam packages affected (1)

conf-vim

Products affected (2)

Product Vendor Version
vim vim n/a
vim vim n/a

References (6)