Zero Day MonitorZDM
DashboardVulnerabilitiesTrendingZero-DaysNewsAbout
Login
ImpressumPrivacy Policy
Zero Day Monitor © 2026
3005 articles · 105207 vulns · 36/41 feeds (7d)
← Back to list
8.2
CVE-2026-34982PATCHED
vim · vim

Vim modeline bypass via various options affects Vim < 9.2.0276

Description

Vim is an open source, command line text editor. Prior to version 9.2.0276, a modeline sandbox bypass in Vim allows arbitrary OS command execution when a user opens a crafted file. The `complete`, `guitabtooltip` and `printheader` options are missing the `P_MLE` flag, allowing a modeline to be executed. Additionally, the `mapset()` function lacks a `check_secure()` call, allowing it to be abused from sandboxed expressions. Commit 9.2.0276 fixes the issue.

Affected Products

VendorProductVersions
vimvim< 9.2.0276

References

  • https://github.com/vim/vim/security/advisories/GHSA-8h6p-m6gr-mpw9(x_refsource_CONFIRM)
  • https://github.com/vim/vim/commit/75661a66a1db1e1f3f1245c615(x_refsource_MISC)
  • https://github.com/vim/vim/releases/tag/v9.2.0276(x_refsource_MISC)

Related News (3 articles)

Tier C
VulDB1d ago
CVE-2026-34982 | vim up to 9.2.275 Command Line mapset os command injection (GHSA-8h6p-m6gr-mpw9)
→ No new info (linked only)
Tier B
BSI Advisories6d ago
[NEU] [hoch] vim: Schwachstelle ermöglicht Codeausführung
→ No new info (linked only)
Tier C
oss-security6d ago
Re: [vim-security] Vim modeline bypass via various options affects Vim < 9.2.0276
→ No new info (linked only)
CVSS 3.18.2 HIGH
VectorCVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N
CISA KEV❌ No
Actively exploited❌ No
Patch available
9.2.276
CWECWE-78
PublishedApr 6, 2026
Last enriched1d agov2
Trending Score42
Source articles3
Independent3
Info Completeness9/14
Missing: epss, kev, exploit, iocs, mitre_attack

Community Vote

0
Login to vote
0 upvotes0 downvotes
No votes yet

Related CVEs (5)

CRITICALCVE-2026-35177EXP
Path traversal issue with zip.vim in Vim
Trending: 43
CRITICALCVE-2026-34714EXP
CVE-2026-34714: Vim before 9.2.0272 allows code execution that happens immediately upon opening a crafted file in the default configurat
Trending: 38
MEDIUMCVE-2026-33412
Vim is an open source, command line text editor. Prior to version 9.2.0202, a command injection vulnerability exists in Vim's glob() function on Unix-like systems. By including a newline character (\n
Trending: 36
MEDIUMPRE-CVE
Netbeans Command Injection in Vim
Trending: 23
MEDIUMCVE-2026-26269
Vim is an open source, command line text editor. Prior to 9.1.2148, a stack buffer overflow vulnerability exists in Vim's NetBeans integration when processing the specialKeys command, affecting Vim bu
Trending: 11

Pin to Dashboard

Verification

State: unverified
Confidence: 0%

Vulnerability Timeline

CVE Published
Apr 6, 2026
Discovered by ZDM
Apr 6, 2026
Updated: description, severity, patchAvailable
Apr 6, 2026
Patch Available
Apr 7, 2026

Version History

v2
Last enriched 1d ago
v2Tier C1d ago

Updated severity to CRITICAL, added new description details, and specified the fixed version as 9.2.276.

descriptionseveritypatchAvailable
via VulDB
v11d ago

Initial creation