CVE-2026-33412

Vim is an open source, command line text editor. Prior to version 9.2.0202, a command injection vulnerability exists in Vim's glob() function on Unix-like systems. By including a newline character (\n) in a pattern passed to glob(), an attacker may be able to execute arbitrary shell commands. This vulnerability depends on the user's 'shell' setting. This issue has been patched in version 9.2.0202.
Configurations

Configuration 1 (hide)

cpe:2.3:a:vim:vim:*:*:*:*:*:*:*:*

History

25 Mar 2026, 21:59

Type Values Removed Values Added
CPE cpe:2.3:a:vim:vim:*:*:*:*:*:*:*:*
First Time Vim vim
Vim
References () https://github.com/vim/vim/commit/645ed6597d1ea896c712cd7ddbb6edee79577e9a - () https://github.com/vim/vim/commit/645ed6597d1ea896c712cd7ddbb6edee79577e9a - Patch
References () https://github.com/vim/vim/releases/tag/v9.2.0202 - () https://github.com/vim/vim/releases/tag/v9.2.0202 - Product
References () https://github.com/vim/vim/security/advisories/GHSA-w5jw-f54h-x46c - () https://github.com/vim/vim/security/advisories/GHSA-w5jw-f54h-x46c - Patch, Vendor Advisory
References () http://www.openwall.com/lists/oss-security/2026/03/19/10 - () http://www.openwall.com/lists/oss-security/2026/03/19/10 - Mailing List, Patch, Third Party Advisory

24 Mar 2026, 21:16

Type Values Removed Values Added
References
  • () http://www.openwall.com/lists/oss-security/2026/03/19/10 -

24 Mar 2026, 20:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-03-24 20:16

Updated : 2026-03-25 21:59


NVD link : CVE-2026-33412

Mitre link : CVE-2026-33412

CVE.ORG link : CVE-2026-33412


JSON object : View

Products Affected

vim

  • vim
CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')