CVE-2026-28422Stack-based Buffer Overflow in VIM

Severity
2.2LOWNVD
OSV6.6
EPSS
0.0%
top 99.74%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedFeb 27
Latest updateApr 16

Description

Vim is an open source, command line text editor. Prior to version 9.2.0078, a stack-buffer-overflow occurs in `build_stl_str_hl()` when rendering a statusline with a multi-byte fill character on a very wide terminal. Version 9.2.0078 patches the issue.

CVSS vector

CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:L/A:NExploitability: 0.8 | Impact: 1.4

Affected Packages6 packages

NVDvim/vim< 9.2.0078
debiandebian/vim< vim 2:9.2.0119-1 (forky)
Debianvim/vim< 2:9.2.0119-1
Ubuntuvim/vim< 2:8.2.3995-1ubuntu2.26+6

Patches

🔴Vulnerability Details

3
VulDB
vim up to 9.2.0077 build_stl_str_hl stack-based overflow (GHSA-gmqx-prf2-8mwf / EUVD-2026-9090)2026-04-16
OSV
vim vulnerabilities2026-03-16
OSV
CVE-2026-28422: Vim is an open source, command line text editor2026-02-27

📋Vendor Advisories

4
Ubuntu
Vim vulnerabilities2026-03-16
Red Hat
vim: Vim: Integrity impact due to stack-buffer-overflow via wide terminal statusline rendering2026-02-27
Microsoft
Vim has stack-buffer-overflow in build_stl_str_hl()2026-02-10
Debian
CVE-2026-28422: vim - Vim is an open source, command line text editor. Prior to version 9.2.0078, a st...2026

🕵️Threat Intelligence

1
Wiz
CVE-2026-28422 Impact, Exploitability, and Mitigation Steps | Wiz

💬Community

1
Bugzilla
CVE-2026-28422 vim: Vim: Integrity impact due to stack-buffer-overflow via wide terminal statusline rendering2026-02-27
CVE-2026-28422 — Stack-based Buffer Overflow in VIM | cvebase