CVE-2026-46483
Vim: Command injection in tar#Vimuntar via missing shellescape {special} flag
Published:
5/15/2026
Last updated:
5/15/2026
Reserved:
5/14/2026
Vim is an open source, command line text editor. Prior to 9.2.0479, a command injection vulnerability exists in tar#Vimuntar() in
runtime/autoload/tar.vim when decompressing .tgz archives on Unix-like systems. The function builds :!gunzip and :!gzip -d commands using shellescape(tartail) without the {special} flag, allowing a crafted archive filename to trigger Vim cmdline-special expansion and execute shell commands in the user's context. This vulnerability is fixed in 9.2.0479.
CNA assigner:
GitHub_M (a0819718-46f1-4df5-94e2-005712e83aaa)
Requested by:
n/a
Products affected (1)
| Product |
Vendor |
Version |
| vim |
vim
|
unspecified
|