Zero Day MonitorZDM
DashboardVulnerabilitiesTrendingZero-DaysNews
Login
ImpressumPrivacy Policy
Zero Day Monitor © 2026
835 articles · 101756 vulns · 36/41 feeds (7d)
← Back to list
9.2
CVE-2026-34714
Vim · Vim

Vim before 9.2.0272 allows code execution that happens immediately upon opening a crafted file in the default configuration, because %{expr} injection occurs with tabpanel lacking P_MLE.

Description

Vim before 9.2.0272 allows code execution that happens immediately upon opening a crafted file in the default configuration, because %{expr} injection occurs with tabpanel lacking P_MLE.

Affected Products

VendorProductVersions
VimVim9.2.0272

Also Affects

Downstream vendors/products affected by this vulnerability

VendorProductSourceConfidence
fedorafedora linuxcert_advisory90%
open sourcevimcert_advisory90%

References

  • https://github.com/vim/vim/commit/664701eb7576edb7c7c7d9f2d600815ec1f43459
  • https://github.com/vim/vim/releases/tag/v9.2.0272
  • https://github.com/vim/vim/security/advisories/GHSA-2gmj-rpqf-pxvh
  • https://www.openwall.com/lists/oss-security/2026/03/30/3

Related News (3 articles)

Tier D
CSO Online7h ago
Vim and GNU Emacs: Claude Code helpfully found zero-day exploits for both
→ No new info (linked only)
Tier B
BSI Advisories15h ago
[UPDATE] [hoch] vim: Schwachstelle ermöglicht Codeausführung
→ No new info (linked only)
Tier A
Microsoft MSRC16h ago
CVE-2026-34714
→ No new info (linked only)
CVSS 3.19.2 CRITICAL
VectorCVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:L
CISA KEV❌ No
Actively exploited❌ No
CWECWE-78
PublishedMar 30, 2026
Last enriched3h agov2
Trending Score44
Source articles3
Independent3
Info Completeness8/14
Missing: epss, kev, exploit, patch, iocs, mitre_attack

Community Vote

0
Login to vote
0 upvotes0 downvotes
No votes yet

Related CVEs (5)

MEDIUMCVE-2026-25749
Vim is an open source, command line text editor. Prior to version 9.1.2132, a heap buffer overflow vulnerability exists in Vim's tag file resolution logic when processing the 'helpfile' option. The vu
Trending: 22
MEDIUMCVE-2026-33412
Vim is an open source, command line text editor. Prior to version 9.2.0202, a command injection vulnerability exists in Vim's glob() function on Unix-like systems. By including a newline character (\n
Trending: 17
MEDIUMCVE-2026-28420
Vim is an open source, command line text editor. Prior to version 9.2.0076, a heap-based buffer overflow WRITE and an out-of-bounds READ exist in Vim's terminal emulator when processing maximum combin
Trending: 15
MEDIUMCVE-2026-28421
Vim is an open source, command line text editor. Versions prior to 9.2.0077 have a heap-buffer-overflow and a segmentation fault (SEGV) exist in Vim's swap file recovery logic. Both are caused by unva
Trending: 15
MEDIUMCVE-2026-28418
Vim is an open source, command line text editor. Prior to version 9.2.0074, a heap-based buffer overflow out-of-bounds read exists in Vim's Emacs-style tags file parsing logic. When processing a malfo
Trending: 15

Pin to Dashboard

Verification

State: verified
Confidence: 100%

Vulnerability Timeline

CVE Published
Mar 30, 2026
Discovered by ZDM
Apr 1, 2026
Updated: vendor, product, affectedVersions
Apr 1, 2026

Version History

v2
Last enriched 3h ago
v2Tier D3h ago

Added vendor and product information, updated affected versions to 9.2.0272, and marked the exploit as actively exploited.

vendorproductaffectedVersions
via CSO Online
v15h ago

Initial creation