CVE-2026-34982
CVE Information
Vim is an open source, command line text editor. Prior to version 9.2.0276, a modeline sandbox bypass in Vim allows arbitrary OS command execution when a user opens a crafted file. The
complete,guitabtooltipandprintheaderoptions are missing theP_MLEflag, allowing a modeline to be executed. Additionally, themapset()function lacks acheck_secure()call, allowing it to be abused from sandboxed expressions. Commit 9.2.0276 fixes the issue.