Vim Remote Code Execution Vulnerability - CVSS 8.2
Summary
CERT-Bund issued security advisory WID-SEC-2026-0904 warning of a high-severity vulnerability (CVSS 8.2) in Vim text editor versions prior to 9.2.0172. The vulnerability allows remote code execution by an unauthenticated attacker. Organizations running Vim on Linux, UNIX, Windows, or other platforms should update immediately to the patched version.
What changed
CERT-Bund published a security advisory regarding CVE-XXXX-XXXX, a remote code execution vulnerability in Vim (Vi IMproved) text editor affecting all versions prior to 9.2.0172. The vulnerability has a CVSS Base Score of 8.2 (high) and a Temporal Score of 7.1. Remote attack capability is listed as 'no', but an attacker can exploit the flaw to execute arbitrary code on affected systems.
Compliance and IT security teams should immediately inventory Vim installations across the organization, prioritize patching to version 9.2.0172 or later, and monitor for indicators of compromise. While no specific compliance deadline is stated, the high severity rating and remote code execution potential make immediate action necessary. Apply the available mitigations referenced in the advisory if immediate patching is not feasible.
What to do next
- Inventory all Vim installations across Linux, UNIX, Windows, and other platforms
- Update Vim to version 9.2.0172 or later immediately
- Monitor CVE databases and apply vendor patches if indicators of compromise are detected
Archived snapshot
Mar 30, 2026GovPing captured this document from the original source. If the source has since changed or been removed, this is the text as it existed at that time.
[WID-SEC-2026-0904] vim: Schwachstelle ermöglicht Codeausführung CVSS Base Score 8.2 (hoch) CVSS Temporal Score 7.1 (hoch) Remoteangriff nein Datum 29.03.2026 Stand 30.03.2026 Mitigation ja
Betroffene Systeme
Betriebssystem
- Linux
- Sonstiges
- UNIX
- Windows
Produktbeschreibung
Vim (Vi IMproved) ist eine Weiterentwicklung des Texteditors vi.
Produkte
29.03.2026
- Open Source vim <9.2.0172
Angriff
Angriff
Ein entfernter, anonymer Angreifer kann eine Schwachstelle in vim ausnutzen, um beliebigen Programmcode auszuführen. CVE Informationen Versionshistorie Feedback zum Advisory geben
Related changes
Get daily alerts for CERT-Bund Security Advisories
Daily digest delivered to your inbox.
Free. Unsubscribe anytime.
Source
About this page
Every important government, regulator, and court update from around the world. One place. Real-time. Free. Our mission
Source document text, dates, docket IDs, and authority are extracted directly from CERT-Bund.
The summary, classification, recommended actions, deadlines, and penalty information are AI-generated from the original text and may contain errors. Always verify against the source document.
Classification
Who this affects
Taxonomy
Browse Categories
Get alerts for this source
We'll email you when CERT-Bund Security Advisories publishes new changes.
Subscribed!
Optional. Filters your digest to exactly the updates that matter to you.