Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2026-28417

Summary
Assigner-GitHub_M
Assigner Org ID-a0819718-46f1-4df5-94e2-005712e83aaa
Published At-27 Feb, 2026 | 21:54
Updated At-28 Feb, 2026 | 00:15
Rejected At-
Credits

Vim has OS Command Injection in netrw

Vim is an open source, command line text editor. Prior to version 9.2.0073, an OS command injection vulnerability exists in the `netrw` standard plugin bundled with Vim. By inducing a user to open a crafted URL (e.g., using the `scp://` protocol handler), an attacker can execute arbitrary shell commands with the privileges of the Vim process. Version 9.2.0073 fixes the issue.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:GitHub_M
Assigner Org ID:a0819718-46f1-4df5-94e2-005712e83aaa
Published At:27 Feb, 2026 | 21:54
Updated At:28 Feb, 2026 | 00:15
Rejected At:
▼CVE Numbering Authority (CNA)
Vim has OS Command Injection in netrw

Vim is an open source, command line text editor. Prior to version 9.2.0073, an OS command injection vulnerability exists in the `netrw` standard plugin bundled with Vim. By inducing a user to open a crafted URL (e.g., using the `scp://` protocol handler), an attacker can execute arbitrary shell commands with the privileges of the Vim process. Version 9.2.0073 fixes the issue.

Affected Products
Vendor
Vimvim
Product
vim
Versions
Affected
  • < 9.2.0073
Problem Types
TypeCWE IDDescription
CWECWE-86CWE-86: Improper Neutralization of Invalid Characters in Identifiers in Web Pages
Type: CWE
CWE ID: CWE-86
Description: CWE-86: Improper Neutralization of Invalid Characters in Identifiers in Web Pages
Metrics
VersionBase scoreBase severityVector
3.14.4MEDIUM
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
Version: 3.1
Base score: 4.4
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://github.com/vim/vim/security/advisories/GHSA-m3xh-9434-g336
x_refsource_CONFIRM
https://github.com/vim/vim/commit/79348dbbc09332130f4c860
x_refsource_MISC
https://github.com/vim/vim/releases/tag/v9.2.0073
x_refsource_MISC
Hyperlink: https://github.com/vim/vim/security/advisories/GHSA-m3xh-9434-g336
Resource:
x_refsource_CONFIRM
Hyperlink: https://github.com/vim/vim/commit/79348dbbc09332130f4c860
Resource:
x_refsource_MISC
Hyperlink: https://github.com/vim/vim/releases/tag/v9.2.0073
Resource:
x_refsource_MISC
▼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://www.openwall.com/lists/oss-security/2026/02/27/6
N/A
Hyperlink: http://www.openwall.com/lists/oss-security/2026/02/27/6
Resource: N/A
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:security-advisories@github.com
Published At:27 Feb, 2026 | 22:16
Updated At:28 Feb, 2026 | 01:16

Vim is an open source, command line text editor. Prior to version 9.2.0073, an OS command injection vulnerability exists in the `netrw` standard plugin bundled with Vim. By inducing a user to open a crafted URL (e.g., using the `scp://` protocol handler), an attacker can execute arbitrary shell commands with the privileges of the Vim process. Version 9.2.0073 fixes the issue.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Secondary3.14.4MEDIUM
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
Type: Secondary
Version: 3.1
Base score: 4.4
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
CPE Matches

Weaknesses
CWE IDTypeSource
CWE-86Secondarysecurity-advisories@github.com
CWE ID: CWE-86
Type: Secondary
Source: security-advisories@github.com
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://github.com/vim/vim/commit/79348dbbc09332130f4c860security-advisories@github.com
N/A
https://github.com/vim/vim/releases/tag/v9.2.0073security-advisories@github.com
N/A
https://github.com/vim/vim/security/advisories/GHSA-m3xh-9434-g336security-advisories@github.com
N/A
http://www.openwall.com/lists/oss-security/2026/02/27/6af854a3a-2127-422b-91ae-364da2661108
N/A
Hyperlink: https://github.com/vim/vim/commit/79348dbbc09332130f4c860
Source: security-advisories@github.com
Resource: N/A
Hyperlink: https://github.com/vim/vim/releases/tag/v9.2.0073
Source: security-advisories@github.com
Resource: N/A
Hyperlink: https://github.com/vim/vim/security/advisories/GHSA-m3xh-9434-g336
Source: security-advisories@github.com
Resource: N/A
Hyperlink: http://www.openwall.com/lists/oss-security/2026/02/27/6
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A

Change History

0
Information is not available yet

Similar CVEs

2Records found

CVE-2026-28418
Matching Score-8
Assigner-GitHub, Inc.
ShareView Details
Matching Score-8
Assigner-GitHub, Inc.
CVSS Score-4.4||MEDIUM
EPSS-Not Assigned
Published-27 Feb, 2026 | 21:58
Updated-28 Feb, 2026 | 01:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Vim has Heap-based Buffer Overflow in Emacs tags parsing

Vim is an open source, command line text editor. Prior to version 9.2.0074, a heap-based buffer overflow out-of-bounds read exists in Vim's Emacs-style tags file parsing logic. When processing a malformed tags file, Vim can be tricked into reading up to 7 bytes beyond the allocated memory boundary. Version 9.2.0074 fixes the issue.

Action-Not Available
Vendor-Vim
Product-vim
CWE ID-CWE-122
Heap-based Buffer Overflow
CWE ID-CWE-125
Out-of-bounds Read
CVE-2025-29768
Matching Score-8
Assigner-GitHub, Inc.
ShareView Details
Matching Score-8
Assigner-GitHub, Inc.
CVSS Score-4.4||MEDIUM
EPSS-0.12% / 31.04%
||
7 Day CHG~0.00%
Published-13 Mar, 2025 | 17:04
Updated-18 Aug, 2025 | 14:14
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Vim vulnerable to potential data loss with zip.vim and special crafted zip files

Vim, a text editor, is vulnerable to potential data loss with zip.vim and special crafted zip files in versions prior to 9.1.1198. The impact is medium because a user must be made to view such an archive with Vim and then press 'x' on such a strange filename. The issue has been fixed as of Vim patch v9.1.1198.

Action-Not Available
Vendor-VimNetApp, Inc.
Product-vimbootstrap_oshci_compute_nodevim
CWE ID-CWE-88
Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')
Details not found