Vim is an open source, command line text editor. Prior to version 9.2.0073, an OS command injection vulnerability exists in the `netrw` standard plugin bundled with Vim. By inducing a user to open a crafted URL (e.g., using the `scp://` protocol handler), an attacker can execute arbitrary shell commands with the privileges of the Vim process. Version 9.2.0073 fixes the issue.
Metrics
Affected Vendors & Products
References
History
Fri, 27 Feb 2026 22:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Vim is an open source, command line text editor. Prior to version 9.2.0073, an OS command injection vulnerability exists in the `netrw` standard plugin bundled with Vim. By inducing a user to open a crafted URL (e.g., using the `scp://` protocol handler), an attacker can execute arbitrary shell commands with the privileges of the Vim process. Version 9.2.0073 fixes the issue. | |
| Title | Vim has OS Command Injection in netrw | |
| Weaknesses | CWE-86 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-02-27T21:54:35.196Z
Reserved: 2026-02-27T15:33:57.290Z
Link: CVE-2026-28417
No data.
Status : Received
Published: 2026-02-27T22:16:24.833
Modified: 2026-02-27T22:16:24.833
Link: CVE-2026-28417
No data.
OpenCVE Enrichment
No data.