CVE-2026-28417: Vim vulnerability analysis and mitigation
Vim is an open source, command line text editor. Prior to version 9.2.0073, an OS command injection vulnerability exists in the netrw standard plugin bundled with Vim. By inducing a user to open a crafted URL (e.g., using the scp:// protocol handler), an attacker can execute arbitrary shell commands with the privileges of the Vim process. Version 9.2.0073 fixes the issue.
Source: NVD
Related Vim vulnerabilities:
CVE ID
Severity
Score
Technologies
Component name
CISA KEV exploit
Has fix
Published date
CVE-2026-34714
HIGH
8.6
Vim
vim-enhanced-debuginfo
No
Yes
Mar 30, 2026
CVE-2026-34982
HIGH
8.2
Vim
vim-debugsource
No
Yes
Apr 06, 2026
CVE-2026-33412
HIGH
7.3
Vim
vim-data-common
No
Yes
Mar 24, 2026
CVE-2026-39881
MEDIUM
5
Vim
vim-minimal
No
Yes
Apr 08, 2026
CVE-2026-35177
MEDIUM
4.1
Vim
vim-debuginfo
No
Yes
Apr 06, 2026
Free Vulnerability Assessment
Benchmark your Cloud Security Posture
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.