Heap Buffer Overflow in Vim Text Editor Affects Users
CVE-2026-25749
6.6MEDIUM
What is CVE-2026-25749?
Vim, the popular open-source command line text editor, is susceptible to a heap buffer overflow vulnerability due to flawed tag file resolution logic when handling the 'helpfile' option. The vulnerability is present in the get_tagfname() function and arises from the unsafe use of STRCPY() for copying user-controlled values into a fixed-size heap buffer. This flaw allows attackers to exploit this weakness when processing help file tags, leading to potential memory corruption issues. A fix has been implemented in version 9.1.2132, and users are advised to upgrade to this version or later to mitigate the risk.
Affected Version(s)
vim < 9.1.2132
