Heap-Based Buffer Overflow in Vim Command Line Text Editor
CVE-2026-28418

4.4MEDIUM

Key Information:

Vendor

Vim

Status
Vendor
CVE Published:
27 February 2026

What is CVE-2026-28418?

Vim, an open-source command line text editor, contains a heap-based buffer overflow vulnerability that occurs during the parsing of Emacs-style tags files. This flaw allows an attacker to craft a malformed tags file which can trick Vim into accessing memory beyond the allocated buffer, potentially leading to unintended memory disclosure or application instability. Users are advised to upgrade to version 9.2.0074 or later to mitigate this issue and ensure safe operation.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.

Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.

Affected Version(s)

vim < 9.2.0074

References

CVSS V3.1

Score:
4.4
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
Low
Availability:
Low
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.