๐Ÿ” CVE Alert

CVE-2026-33412

MEDIUM 5.6

Vim affected by Command injection via newline in glob()

CVSS Score
5.6
EPSS Score
0.1%
EPSS Percentile
15th

Vim is an open source, command line text editor. Prior to version 9.2.0202, a command injection vulnerability exists in Vim's glob() function on Unix-like systems. By including a newline character (\n) in a pattern passed to glob(), an attacker may be able to execute arbitrary shell commands. This vulnerability depends on the user's 'shell' setting. This issue has been patched in version 9.2.0202.

CWE CWE-78
Vendor vim
Product vim
Published Mar 24, 2026
Last Updated Mar 26, 2026
Stay Ahead of the Next One

Get instant alerts for vim vim

Be the first to know when new medium vulnerabilities affecting vim vim are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:H/A:N
Attack Vector
Local
Attack Complexity
Low
Privileges Required
Low
User Interaction
Required
Scope
Unchanged
Confidentiality
Low
Integrity
High
Availability
None

Affected Versions

vim / vim
< 9.2.0202

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/vim/vim/security/advisories/GHSA-w5jw-f54h-x46c github.com: https://github.com/vim/vim/commit/645ed6597d1ea896c712cd7ddbb6edee79577e9a github.com: https://github.com/vim/vim/releases/tag/v9.2.0202 openwall.com: http://www.openwall.com/lists/oss-security/2026/03/19/10