Duty Analyst: Salva Rocha

CVE-2026-34714

Published: 2026-03-30 19:16:27 | Last modified: 2026-04-03 12:16:19

CRITICAL CVSS 9.2
No EPSS data

Description

Vim before 9.2.0272 allows code execution that happens immediately upon opening a crafted file in the default configuration, because %{expr} injection occurs with tabpanel lacking P_MLE.

CVSS details

Severity
critical
Score
9.2
Vector
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:L

EPSS

This CVE is not currently listed in the EPSS dataset.

Show JSON
{
    "cve": {
        "id": "CVE-2026-34714",
        "cveTags": [],
        "metrics": {
            "cvssMetricV31": [
                {
                    "type": "Secondary",
                    "source": "cve@mitre.org",
                    "cvssData": {
                        "scope": "CHANGED",
                        "version": "3.1",
                        "baseScore": 9.2,
                        "attackVector": "LOCAL",
                        "baseSeverity": "CRITICAL",
                        "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:L",
                        "integrityImpact": "HIGH",
                        "userInteraction": "NONE",
                        "attackComplexity": "LOW",
                        "availabilityImpact": "LOW",
                        "privilegesRequired": "NONE",
                        "confidentialityImpact": "HIGH"
                    },
                    "impactScore": 6,
                    "exploitabilityScore": 2.5
                },
                {
                    "type": "Primary",
                    "source": "nvd@nist.gov",
                    "cvssData": {
                        "scope": "CHANGED",
                        "version": "3.1",
                        "baseScore": 8.6,
                        "attackVector": "LOCAL",
                        "baseSeverity": "HIGH",
                        "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
                        "integrityImpact": "HIGH",
                        "userInteraction": "REQUIRED",
                        "attackComplexity": "LOW",
                        "availabilityImpact": "HIGH",
                        "privilegesRequired": "NONE",
                        "confidentialityImpact": "HIGH"
                    },
                    "impactScore": 6,
                    "exploitabilityScore": 1.8
                }
            ]
        },
        "published": "2026-03-30T19:16:26.853",
        "references": [
            {
                "url": "https://github.com/vim/vim/commit/664701eb7576edb7c7c7d9f2d600815ec1f43459",
                "tags": [
                    "Patch"
                ],
                "source": "cve@mitre.org"
            },
            {
                "url": "https://github.com/vim/vim/releases/tag/v9.2.0272",
                "tags": [
                    "Release Notes"
                ],
                "source": "cve@mitre.org"
            },
            {
                "url": "https://github.com/vim/vim/security/advisories/GHSA-2gmj-rpqf-pxvh",
                "tags": [
                    "Vendor Advisory"
                ],
                "source": "cve@mitre.org"
            },
            {
                "url": "https://www.openwall.com/lists/oss-security/2026/03/30/3",
                "tags": [
                    "Mailing List",
                    "Third Party Advisory"
                ],
                "source": "cve@mitre.org"
            },
            {
                "url": "http://www.openwall.com/lists/oss-security/2026/04/02/4",
                "tags": [
                    "Issue Tracking",
                    "Mailing List"
                ],
                "source": "af854a3a-2127-422b-91ae-364da2661108"
            },
            {
                "url": "http://www.openwall.com/lists/oss-security/2026/04/02/5",
                "source": "af854a3a-2127-422b-91ae-364da2661108"
            },
            {
                "url": "http://www.openwall.com/lists/oss-security/2026/04/03/6",
                "source": "af854a3a-2127-422b-91ae-364da2661108"
            }
        ],
        "vulnStatus": "Modified",
        "weaknesses": [
            {
                "type": "Secondary",
                "source": "cve@mitre.org",
                "description": [
                    {
                        "lang": "en",
                        "value": "CWE-78"
                    }
                ]
            }
        ],
        "descriptions": [
            {
                "lang": "en",
                "value": "Vim before 9.2.0272 allows code execution that happens immediately upon opening a crafted file in the default configuration, because %{expr} injection occurs with tabpanel lacking P_MLE."
            },
            {
                "lang": "es",
                "value": "Vim anterior a la versi\u00f3n 9.2.0272 permite la ejecuci\u00f3n de c\u00f3digo que ocurre inmediatamente al abrir un archivo especialmente dise\u00f1ado en la configuraci\u00f3n predeterminada, porque se produce una inyecci\u00f3n de %{expr} con tabpanel que carece de P_MLE."
            }
        ],
        "lastModified": "2026-04-03T12:16:18.500",
        "configurations": [
            {
                "nodes": [
                    {
                        "negate": false,
                        "cpeMatch": [
                            {
                                "criteria": "cpe:2.3:a:vim:vim:*:*:*:*:*:*:*:*",
                                "vulnerable": true,
                                "matchCriteriaId": "82217BEF-646B-4092-B88A-33A17080CF1B",
                                "versionEndExcluding": "9.2.0272"
                            }
                        ],
                        "operator": "OR"
                    }
                ]
            }
        ],
        "sourceIdentifier": "cve@mitre.org"
    }
}