VYPR
High severity8.2NVD Advisory· Published Apr 6, 2026· Updated Apr 22, 2026

CVE-2026-34982

CVE-2026-34982

Description

Vim is an open source, command line text editor. Prior to version 9.2.0276, a modeline sandbox bypass in Vim allows arbitrary OS command execution when a user opens a crafted file. The complete, guitabtooltip and printheader options are missing the P_MLE flag, allowing a modeline to be executed. Additionally, the mapset() function lacks a check_secure() call, allowing it to be abused from sandboxed expressions. Commit 9.2.0276 fixes the issue.

Affected products

1
  • cpe:2.3:a:vim:vim:*:*:*:*:*:*:*:*
    Range: <9.2.0276

Patches

1
75661a66a1db

Vulnerability mechanics

Generated by null/stub on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

4

News mentions

0

No linked articles in our index yet.