Ad

CVE-2026-28417

MEDIUM CVSS 3.1: 4.4 EPSS 0.01%
Updated Feb 28, 2026
Vim
Parameter Value
CVSS 4.4 (MEDIUM)
Type CWE-86
Vendor Vim
Public PoC No

Vim is an open source, command line text editor. Prior to version 9.2.0073, an OS command injection vulnerability exists in the `netrw` standard plugin bundled with Vim. By inducing a user to open a crafted URL (e.g., using the `scp://` protocol handler), an attacker can execute arbitrary shell commands with the privileges of the Vim process.

Version 9.2.0073 fixes the issue.

Attack Parameters

Attack Vector
Local
Requires local access
Attack Complexity
Low
Easy to exploit
Privileges Required
None
No privileges needed
User Interaction
Required
User action required

Impact Assessment

Confidentiality
Low
Partial data leak
Integrity
Low
Partial data modification
Availability
None
No disruption

CVSS Vector v3.1

Weakness Type (CWE)