CVE-2026-33412

Vim is an open source, command line text editor. Prior to version 9.2.0202, a command injection vulnerability exists in Vim's glob() function on Unix-like systems. By including a newline character (\n) in a pattern passed to glob(), an attacker may be able to execute arbitrary shell commands. This vulnerability depends on the user's 'shell' setting. This issue has been patched in version 9.2.0202.
Configurations

Configuration 1 (hide)

cpe:2.3:a:vim:vim:*:*:*:*:*:*:*:*

History

No history.

Information

Published : 2026-03-24 20:16

Updated : 2026-03-25 21:59


NVD link : CVE-2026-33412

Mitre link : CVE-2026-33412

CVE.ORG link : CVE-2026-33412


JSON object : View

Products Affected

vim

  • vim
CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')