CVE-2025-27423Command Injection in Azl3 VIM 9.1.1164-1 ON Azure Linux 3.0

CWE-77Command Injection5 documents5 sources
Severity
7.1HIGHNVD
EPSS
2.1%
top 15.98%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMar 3
Latest updateMar 11

Description

Vim is an open source, command line text editor. Vim is distributed with the tar.vim plugin, that allows easy editing and viewing of (compressed or uncompressed) tar files. Starting with 9.1.0858, the tar.vim plugin uses the ":read" ex command line to append below the cursor position, however the is not sanitized and is taken literally from the tar archive. This allows to execute shell commands via special crafted tar archives. Whether this really happens, depends on the shell being used ('shell

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:NExploitability: 1.8 | Impact: 5.2

Affected Packages8 packages

CVEListV5vim/vim< 9.1.1164
NVDvim/vim9.1.08589.1.1164
debiandebian/vim< vim 2:9.1.1230-1 (forky)

Patches

🔴Vulnerability Details

1
OSV
CVE-2025-27423: Vim is an open source, command line text editor2025-03-03

📋Vendor Advisories

3
Microsoft
Improper Input Validation in Vim2025-03-11
Red Hat
vim: Improper Input Validation in Vim2025-03-03
Debian
CVE-2025-27423: vim - Vim is an open source, command line text editor. Vim is distributed with the tar...2025
CVE-2025-27423 — Command Injection | cvebase