Heap Buffer Overflow in Vim Text Editor Affects Users
CVE-2026-25749
What is CVE-2026-25749?
Vim, the popular open-source command line text editor, is susceptible to a heap buffer overflow vulnerability due to flawed tag file resolution logic when handling the 'helpfile' option. The vulnerability is present in the get_tagfname() function and arises from the unsafe use of STRCPY() for copying user-controlled values into a fixed-size heap buffer. This flaw allows attackers to exploit this weakness when processing help file tags, leading to potential memory corruption issues. A fix has been implemented in version 9.1.2132, and users are advised to upgrade to this version or later to mitigate the risk.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.
Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.
Affected Version(s)
vim < 9.1.2132
References
CVSS V3.1
Timeline
Vulnerability published
Vulnerability Reserved
