Heap Buffer Overflow in Vim Text Editor Affects Users
CVE-2026-25749

6.6MEDIUM

Key Information:

Vendor

Vim

Status
Vendor
CVE Published:
6 February 2026

What is CVE-2026-25749?

Vim, the popular open-source command line text editor, is susceptible to a heap buffer overflow vulnerability due to flawed tag file resolution logic when handling the 'helpfile' option. The vulnerability is present in the get_tagfname() function and arises from the unsafe use of STRCPY() for copying user-controlled values into a fixed-size heap buffer. This flaw allows attackers to exploit this weakness when processing help file tags, leading to potential memory corruption issues. A fix has been implemented in version 9.1.2132, and users are advised to upgrade to this version or later to mitigate the risk.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.

Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.

Affected Version(s)

vim < 9.1.2132

References

CVSS V3.1

Score:
6.6
Severity:
MEDIUM
Confidentiality:
None
Integrity:
High
Availability:
None
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
Required
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.