CVE-2026-34982
HIGHVim modeline bypass via various options affects Vim < 9.2.0276
Title source: cnaDescription
Vim is an open source, command line text editor. Prior to version 9.2.0276, a modeline sandbox bypass in Vim allows arbitrary OS command execution when a user opens a crafted file. The `complete`, `guitabtooltip` and `printheader` options are missing the `P_MLE` flag, allowing a modeline to be executed. Additionally, the `mapset()` function lacks a `check_secure()` call, allowing it to be abused from sandboxed expressions. Commit 9.2.0276 fixes the issue.
Exploits (1)
github
NO CODE
1 stars
by Hex0rc1st · pythonpoc
https://github.com/Hex0rc1st/CVE_POC_monitor/tree/main/article/uploads/demo_1775123182/【已复现】Vim 又一 RCE 漏洞(CVE-2026-34982):利用存在限制条件
Scores
CVSS v3
8.2
EPSS
0.0003
EPSS Percentile
9.1%
Attack Vector
LOCAL
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N
Details
CWE
CWE-78
Status
published
Products (1)
vim/vim
< 9.2.0276 (2 CPE variants)
Published
Apr 06, 2026
Tracked Since
Apr 06, 2026