Vulnerability Description
Vim is an open source, command line text editor. Prior to version 9.2.0435, an OS command injection vulnerability exists in Vim's :find command-line completion. When the path option contains backtick-enclosed shell commands, those commands are executed during file name completion. Because the path option lacks the P_SECURE flag, it can be set from a modeline, allowing an attacker who controls the contents of a file to execute arbitrary shell commands when the user opens that file in Vim and triggers :find completion. This issue has been patched in version 9.2.0435.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Vim | Vim | < 9.2.0435 |
Related Weaknesses (CWE)
References
- https://github.com/vim/vim/commit/190cb3c2b9c769a3972bcfd991a7b5b6cb771ef0Patch
- https://github.com/vim/vim/releases/tag/v9.2.0435Product
- https://github.com/vim/vim/security/advisories/GHSA-hwg5-3cxw-wvvgPatchVendor Advisory
FAQ
What is CVE-2026-44656?
CVE-2026-44656 is a vulnerability with a CVSS score of 5.3 (MEDIUM). Vim is an open source, command line text editor. Prior to version 9.2.0435, an OS command injection vulnerability exists in Vim's :find command-line completion. When the path option contains backtick-...
How severe is CVE-2026-44656?
CVE-2026-44656 has been rated MEDIUM with a CVSS base score of 5.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-44656?
Check the references section above for vendor advisories and patch information. Affected products include: Vim Vim.