CVE-2026-42307 PUBLISHED

Vim: OS Command Injection in netrw

Assigner: GitHub_M
Reserved: 26.04.2026 Published: 08.05.2026 Updated: 08.05.2026

Vim is an open source, command line text editor. Prior to version 9.2.0383, an OS command injection vulnerability exists in the netrw standard plugin bundled with Vim. By inducing a user to open a crafted URL (e.g., using the sftp:// or file:// protocol handlers), an attacker can execute arbitrary shell commands with the privileges of the Vim process. This issue has been patched in version 9.2.0383.

Metrics

CVSS Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
CVSS Score: 4.4

Product Status

Vendor vim
Product vim
Versions
  • Version < 9.2.0383 is affected

References

Problem Types

  • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') CWE