« List of all CVEs

CVE-2026-46483

Vim: Command injection in tar#Vimuntar via missing shellescape {special} flag

Published: 5/15/2026 Last updated: 5/15/2026 Reserved: 5/14/2026

Vim is an open source, command line text editor. Prior to 9.2.0479, a command injection vulnerability exists in tar#Vimuntar() in runtime/autoload/tar.vim when decompressing .tgz archives on Unix-like systems. The function builds :!gunzip and :!gzip -d commands using shellescape(tartail) without the {special} flag, allowing a crafted archive filename to trigger Vim cmdline-special expansion and execute shell commands in the user's context. This vulnerability is fixed in 9.2.0479.

CNA assigner: GitHub_M (a0819718-46f1-4df5-94e2-005712e83aaa) Requested by: n/a

Metrics

Version Score Severity Vector String
3.1 3.6 Low CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N

Opam packages affected (1)

conf-vim

Products affected (1)

Product Vendor Version
vim vim unspecified

References (3)