Vulnerability Description
Vim before 9.2.0272 allows code execution that happens immediately upon opening a crafted file in the default configuration, because %{expr} injection occurs with tabpanel lacking P_MLE.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Vim | Vim | < 9.2.0272 |
Related Weaknesses (CWE)
References
- https://github.com/vim/vim/commit/664701eb7576edb7c7c7d9f2d600815ec1f43459Patch
- https://github.com/vim/vim/releases/tag/v9.2.0272Release Notes
- https://github.com/vim/vim/security/advisories/GHSA-2gmj-rpqf-pxvhVendor Advisory
- https://www.openwall.com/lists/oss-security/2026/03/30/3Mailing ListThird Party Advisory
- http://www.openwall.com/lists/oss-security/2026/04/02/4Issue TrackingMailing List
- http://www.openwall.com/lists/oss-security/2026/04/02/5
- http://www.openwall.com/lists/oss-security/2026/04/03/6
FAQ
What is CVE-2026-34714?
CVE-2026-34714 is a vulnerability with a CVSS score of 9.2 (CRITICAL). Vim before 9.2.0272 allows code execution that happens immediately upon opening a crafted file in the default configuration, because %{expr} injection occurs with tabpanel lacking P_MLE.
How severe is CVE-2026-34714?
CVE-2026-34714 has been rated CRITICAL with a CVSS base score of 9.2/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2026-34714?
Check the references section above for vendor advisories and patch information. Affected products include: Vim Vim.