Vulnerability Description
Vim is an open source, command line text editor. Prior to 9.2.0479, a command injection vulnerability exists in tar#Vimuntar() in runtime/autoload/tar.vim when decompressing .tgz archives on Unix-like systems. The function builds :!gunzip and :!gzip -d commands using shellescape(tartail) without the {special} flag, allowing a crafted archive filename to trigger Vim cmdline-special expansion and execute shell commands in the user's context. This vulnerability is fixed in 9.2.0479.
CVSS Score
LOW
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Vim | Vim | < 9.2.0479 |
Related Weaknesses (CWE)
References
- https://github.com/vim/vim/commit/3fb5e58fbc63d86a3e65f1a141b0d67af2aa38a1Patch
- https://github.com/vim/vim/releases/tag/v9.2.0479Product
- https://github.com/vim/vim/security/advisories/GHSA-2fpv-9ff7-xg5wPatchVendor Advisory
FAQ
What is CVE-2026-46483?
CVE-2026-46483 is a vulnerability with a CVSS score of 3.6 (LOW). Vim is an open source, command line text editor. Prior to 9.2.0479, a command injection vulnerability exists in tar#Vimuntar() in runtime/autoload/tar.vim when decompressing .tgz archives on Unix-like...
How severe is CVE-2026-46483?
CVE-2026-46483 has been rated LOW with a CVSS base score of 3.6/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-46483?
Check the references section above for vendor advisories and patch information. Affected products include: Vim Vim.