CVE-2025-1215

LOW

vim <9.1.1096 - Memory Corruption

Title source: llm
STIX 2.1

Description

A vulnerability classified as problematic was found in vim up to 9.1.1096. This vulnerability affects unknown code of the file src/main.c. The manipulation of the argument --log leads to memory corruption. It is possible to launch the attack on the local host. Upgrading to version 9.1.1097 is able to address this issue. The patch is identified as c5654b84480822817bb7b69ebc97c174c91185e9. It is recommended to upgrade the affected component.

References (7)

Core 7
Core References
Third Party Advisory, VDB Entry vdb-entry technical-description
https://vuldb.com/?id.295174
Permissions Required, VDB Entry signature permissions-required
https://vuldb.com/?ctiid.295174
Third Party Advisory, VDB Entry third-party-advisory
https://vuldb.com/?submit.497546
Exploit, Issue Tracking issue-tracking
https://github.com/vim/vim/issues/16606

Scores

CVSS v3 2.8
EPSS 0.0004
EPSS Percentile 12.0%
Attack Vector LOCAL
CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L

CISA SSVC

Vulnrichment
Exploitation poc
Automatable no
Technical Impact partial

Details

CWE
CWE-119
Status published
Products (2)
netapp/bootstrap_os
vim/vim < 9.1.1097
Published Feb 12, 2025
Tracked Since Feb 18, 2026