CVE-2026-34982
Public on 2026-04-03
Modified on 2026-04-03
Description
A modeline sandbox bypass in Vim allows arbitrary OS command execution when a user opens a crafted file. The complete, guitabtooltip and printheader options are missing the P_MLE flag, allowing a modeline to be executed. Additionally, the mapset() function lacks a check_secure() call, allowing it to be abused from sandboxed expressions.
An attacker who can deliver a crafted file to a victim achieves arbitrary command execution with the privileges of the user running Vim.
An attacker who can deliver a crafted file to a victim achieves arbitrary command execution with the privileges of the user running Vim.
Severity
See what this means
CVSS v3 Base Score
See breakdown
Affected Packages
| Platform | Package | Release Date | Advisory | Status |
|---|---|---|---|---|
| Amazon Linux 2 - Core | vim | Pending Fix | ||
| Amazon Linux 2023 | vim | Pending Fix |
CVSS Scores
| Score Type | Score | Vector | |
|---|---|---|---|
| Amazon Linux | CVSSv3 | 8.2 | CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N |