A command injection vulnerability exists in Vim's tag file processing. When resolving a tag, the filename field from the tags file is passed through wildcard expansion to resolve environment variables and wildcards. If the filename field contains backtick syntax, Vim executes the embedded command via the system shell with the full privileges of the running user.
| Vendor | Product | Versions |
|---|---|---|
| vim | — | < 9.2.0357 |