CVE-2026-33412 — OS Command Injection in VIM
Severity
7.3HIGHNVD
EPSS
0.0%
top 99.08%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedMar 24
Latest updateApr 13
Description
Vim is an open source, command line text editor. Prior to version 9.2.0202, a command injection vulnerability exists in Vim's glob() function on Unix-like systems. By including a newline character (\n) in a pattern passed to glob(), an attacker may be able to execute arbitrary shell commands. This vulnerability depends on the user's 'shell' setting. This issue has been patched in version 9.2.0202.
CVSS vector
CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:HExploitability: 1.3 | Impact: 5.9
Affected Packages5 packages
Patches
🔴Vulnerability Details
1📋Vendor Advisories
4Debian▶
CVE-2026-33412: vim - Vim is an open source, command line text editor. Prior to version 9.2.0202, a co...↗2026
🕵️Threat Intelligence
14💬Community
1Bugzilla▶
CVE-2026-33412 vim: Vim: Arbitrary code execution via command injection in glob() function↗2026-03-24