CVE-2026-41411

MEDIUM

Vim <9.2.0357 - Command Injection

Title source: llm
STIX 2.1

Description

Vim is an open source, command line text editor. Prior to 9.2.0357, A command injection vulnerability exists in Vim's tag file processing. When resolving a tag, the filename field from the tags file is passed through wildcard expansion to resolve environment variables and wildcards. If the filename field contains backtick syntax (e.g., `command`), Vim executes the embedded command via the system shell with the full privileges of the running user.

Scores

CVSS v3 6.6
EPSS 0.0015
EPSS Percentile 34.8%
Attack Vector LOCAL
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:L

CISA SSVC

Vulnrichment
Exploitation none
Automatable no
Technical Impact total

Details

CWE
CWE-78
Status published
Products (1)
vim/vim < 9.2.0357 (2 CPE variants)
Published Apr 24, 2026
Tracked Since Apr 26, 2026