Arbitrary Command Injection Affecting vim/vim package, versions [9.1.0858,9.1.1164)


Severity

Recommended
0.0
high
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Arbitrary Command Injection vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-UNMANAGED-VIMVIM-9296447
  • published6 Mar 2025
  • disclosed3 Mar 2025
  • creditRy0taK

Introduced: 3 Mar 2025

NewCVE-2025-27423  (opens in a new tab)
CWE-77  (opens in a new tab)

How to fix?

Upgrade vim/vim to version 9.1.1164 or higher.

Overview

Affected versions of this package are vulnerable to Arbitrary Command Injection when reading a file with a filename including special characters using the :read command. An attacker can convince a user to read a file with a malicious name, which will be processed by tar.vim without sanitization.

CVSS Base Scores

version 4.0
version 3.1