CVE-2026-28417 — Improper Neutralization of Invalid Characters in Identifiers in Web Pages in VIM
Severity
7.8HIGHNVD
OSV6.6
EPSS
0.0%
top 98.23%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedFeb 27
Latest updateMar 16
Description
Vim is an open source, command line text editor. Prior to version 9.2.0073, an OS command injection vulnerability exists in the `netrw` standard plugin bundled with Vim. By inducing a user to open a crafted URL (e.g., using the `scp://` protocol handler), an attacker can execute arbitrary shell commands with the privileges of the Vim process. Version 9.2.0073 fixes the issue.
CVSS vector
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9
Affected Packages6 packages
Patches
🔴Vulnerability Details
2📋Vendor Advisories
4Debian▶
CVE-2026-28417: vim - Vim is an open source, command line text editor. Prior to version 9.2.0073, an O...↗2026
🕵️Threat Intelligence
1💬Community
1Bugzilla▶
CVE-2026-28417 vim: Vim: Arbitrary code execution via OS command injection in the netrw plugin↗2026-02-27