CVE-2026-41411

Publication date 28 April 2026

Last updated 13 May 2026


Ubuntu priority

Cvss 3 Severity Score

6.6 · Medium

Score breakdown

Description

Vim is an open source, command line text editor. Prior to 9.2.0357, A command injection vulnerability exists in Vim's tag file processing. When resolving a tag, the filename field from the tags file is passed through wildcard expansion to resolve environment variables and wildcards. If the filename field contains backtick syntax (e.g., `command`), Vim executes the embedded command via the system shell with the full privileges of the running user.

Status

Package Ubuntu Release Status
vim 26.04 LTS resolute
Fixed 2:9.1.2141-1ubuntu4.1
25.10 questing
Fixed 2:9.1.0967-1ubuntu6.4
24.04 LTS noble
Fixed 2:9.1.0016-1ubuntu7.13
22.04 LTS jammy
Fixed 2:8.2.3995-1ubuntu2.29
20.04 LTS focal
Vulnerable
18.04 LTS bionic
Vulnerable
16.04 LTS xenial
Vulnerable
14.04 LTS trusty
Vulnerable

Severity score breakdown

Parameter Value
Base score 6.6 · Medium
Attack vector Local
Attack complexity Low
Privileges required None
User interaction Required
Scope Unchanged
Confidentiality Low
Integrity impact High
Availability impact Low
Vector CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:L

Access our resources on patching vulnerabilities