๐Ÿ” CVE Alert

CVE-2026-41411

MEDIUM 6.6

Vim: Command injection via backtick expansion in tag filenames

CVSS Score
6.6
EPSS Score
0.0%
EPSS Percentile
0th

Vim is an open source, command line text editor. Prior to 9.2.0357, A command injection vulnerability exists in Vim's tag file processing. When resolving a tag, the filename field from the tags file is passed through wildcard expansion to resolve environment variables and wildcards. If the filename field contains backtick syntax (e.g., `command`), Vim executes the embedded command via the system shell with the full privileges of the running user.

CWE CWE-78
Vendor vim
Product vim
Published Apr 24, 2026
Last Updated Apr 24, 2026
Stay Ahead of the Next One

Get instant alerts for vim vim

Be the first to know when new medium vulnerabilities affecting vim vim are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:L
Attack Vector
Local
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Unchanged
Confidentiality
Low
Integrity
High
Availability
Low

Affected Versions

vim / vim
< 9.2.0357

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/vim/vim/security/advisories/GHSA-cwgx-gcj7-6qh8 github.com: https://github.com/vim/vim/commit/c78194e41d5a0b05b0ddf383b6679b1503f977fb github.com: https://github.com/vim/vim/releases/tag/v9.2.0357