
Cloud Vulnerability DB
A community-led vulnerabilities database
Vim, an open source command line text editor, was found to contain a use-after-free vulnerability (CVE-2025-55157) affecting versions from 9.1.1231 to before 9.1.1400. The vulnerability was discovered in the tuple data type processing functionality, which was introduced in version 9.1.1232. The issue occurs when processing nested tuples in Vim script, where an error during evaluation can trigger a use-after-free condition in Vim's internal tuple reference management (GitHub Advisory).
The vulnerability specifically involves the tuple_unref() function, which may access already freed memory due to improper lifetime handling, leading to memory corruption. The issue was discovered through fuzz testing with AFL++ and confirmed using AddressSanitizer. The vulnerability has been assigned a CVSS v3.1 base score of 8.8 (HIGH) with the vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H (NVD).
While the primary impact is a potential denial-of-service through application crash, the underlying memory corruption could theoretically be leveraged for more severe consequences depending on the environment in which Vim is running. However, the exploit requires direct user interaction as the script must be explicitly executed within Vim (GitHub Advisory).
The vulnerability has been patched in Vim version 9.1.1400. Users are advised to upgrade to this version or later to mitigate the risk. The fix involves returning early in case of an error in the tuple evaluation process (GitHub Commit).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."