๐Ÿ” CVE Alert

CVE-2026-44656

UNKNOWN 0.0

Vim: OS Command Injection via 'path' completion

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

Vim is an open source, command line text editor. Prior to version 9.2.0435, an OS command injection vulnerability exists in Vim's :find command-line completion. When the path option contains backtick-enclosed shell commands, those commands are executed during file name completion. Because the path option lacks the P_SECURE flag, it can be set from a modeline, allowing an attacker who controls the contents of a file to execute arbitrary shell commands when the user opens that file in Vim and triggers :find completion. This issue has been patched in version 9.2.0435.

CWE CWE-78
Vendor vim
Product vim
Published May 8, 2026
Stay Ahead of the Next One

Get instant alerts for vim vim

Be the first to know when new unknown vulnerabilities affecting vim vim are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

vim / vim
< 9.2.0435

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/vim/vim/security/advisories/GHSA-hwg5-3cxw-wvvg github.com: https://github.com/vim/vim/commit/190cb3c2b9c769a3972bcfd991a7b5b6cb771ef0 github.com: https://github.com/vim/vim/releases/tag/v9.2.0435