CVE-2026-28418Heap-based Buffer Overflow in VIM

Severity
5.5MEDIUMNVD
OSV6.6
EPSS
0.0%
top 99.80%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedFeb 27
Latest updateMar 16

Description

Vim is an open source, command line text editor. Prior to version 9.2.0074, a heap-based buffer overflow out-of-bounds read exists in Vim's Emacs-style tags file parsing logic. When processing a malformed tags file, Vim can be tricked into reading up to 7 bytes beyond the allocated memory boundary. Version 9.2.0074 fixes the issue.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:HExploitability: 1.8 | Impact: 3.6

Affected Packages6 packages

NVDvim/vim< 9.2.0074
debiandebian/vim< vim 2:9.2.0119-1 (forky)
Debianvim/vim< 2:9.2.0119-1
Ubuntuvim/vim< 2:8.2.3995-1ubuntu2.26+6

Patches

🔴Vulnerability Details

2
OSV
vim vulnerabilities2026-03-16
OSV
CVE-2026-28418: Vim is an open source, command line text editor2026-02-27

📋Vendor Advisories

4
Ubuntu
Vim vulnerabilities2026-03-16
Red Hat
vim: Vim: Information disclosure via heap-based buffer overflow in Emacs-style tags file parsing2026-02-27
Microsoft
Vim has Heap-based Buffer Overflow in Emacs tags parsing2026-02-10
Debian
CVE-2026-28418: vim - Vim is an open source, command line text editor. Prior to version 9.2.0074, a he...2026

🕵️Threat Intelligence

1
Wiz
CVE-2026-28418 Impact, Exploitability, and Mitigation Steps | Wiz

💬Community

1
Bugzilla
CVE-2026-28418 vim: Vim: Information disclosure via heap-based buffer overflow in Emacs-style tags file parsing2026-02-27
CVE-2026-28418 — Heap-based Buffer Overflow in VIM | cvebase