CVE-2026-28421 — Improper Input Validation in VIM
Severity
7.8HIGHNVD
OSV6.6
EPSS
0.0%
top 98.78%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedFeb 27
Latest updateApr 16
Description
Vim is an open source, command line text editor. Versions prior to 9.2.0077 have a heap-buffer-overflow and a segmentation fault (SEGV) exist in Vim's swap file recovery logic. Both are caused by unvalidated fields read from crafted pointer blocks within a swap file. Version 9.2.0077 fixes the issue.
CVSS vector
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9
Affected Packages6 packages
Patches
🔴Vulnerability Details
3📋Vendor Advisories
4Debian▶
CVE-2026-28421: vim - Vim is an open source, command line text editor. Versions prior to 9.2.0077 have...↗2026
🕵️Threat Intelligence
1💬Community
1Bugzilla▶
CVE-2026-28421 vim: Vim: Denial of service and information disclosure via crafted swap file↗2026-02-27