Vim Vulnerability Allows Code Execution (CVSS 6.6)
Summary
The German National Cybersecurity Agency (BSI) has issued a security advisory for a vulnerability in the Vim text editor. The vulnerability, with a CVSS score of 6.6, allows local attackers to execute arbitrary code. Mitigation is available.
What changed
A critical vulnerability (CVSS 6.6) has been identified in the Vim text editor, specifically affecting versions prior to 9.1.2132. This vulnerability allows local attackers to cause memory corruption, execute arbitrary code, or trigger a denial-of-service condition. The advisory notes that mitigation measures are available.
Organizations using Vim on Linux-based systems (including Oracle Linux, Red Hat Enterprise Linux, Fedora Linux, and Rocky Linux) and Windows are advised to review the advisory and apply available mitigations or updates. While this is a notice of a vulnerability and not a direct regulatory mandate, failure to address such security flaws can lead to significant data breaches and operational disruptions, potentially incurring costs related to incident response and system recovery.
What to do next
- Review security advisory WID-SEC-2026-0335 for Vim vulnerability.
- Assess impact on systems running affected Vim versions.
- Implement available mitigations or update Vim to a patched version.
Source document (simplified)
[WID-SEC-2026-0335] vim: Schwachstelle ermöglicht Codeausführung CVSS Base Score 6.6 (mittel) CVSS Temporal Score 5.8 (mittel) Remoteangriff nein Datum 05.02.2026 Stand UPDATE 13.03.2026 Mitigation ja
Betroffene Systeme
Betriebssystem
- Sonstiges
- UNIX
- Windows
Produktbeschreibung
Vim (Vi IMproved) ist eine Weiterentwicklung des Texteditors vi.
Produkte
UPDATE 12.03.2026
- Oracle Linux
- RESF Rocky Linux UPDATE 11.03.2026
- Red Hat Enterprise Linux UPDATE 15.02.2026
- Fedora Linux 05.02.2026
- Open Source vim <9.1.2132
Angriff
Angriff
Ein lokaler Angreifer kann eine Schwachstelle in vim ausnutzen, um eine Speicherbeschädigung zu verursachen, beliebigen Code auszuführen oder einen Denial-of-Service-Zustand herbeizuführen. CVE Informationen Versionshistorie Feedback zum Advisory geben
Related changes
Source
Classification
Who this affects
Taxonomy
Browse Categories
Get Vulnerability Alerts alerts
Weekly digest. AI-summarized, no noise.
Free. Unsubscribe anytime.
Get alerts for this source
We'll email you when CERT-Bund Security Advisories publishes new changes.