Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2025-66476

Опубликовано: 02 дек. 2025
Источник: redhat
CVSS3: 0
EPSS Низкий

Описание

Vim is an open source, command line text editor. Prior to version 9.1.1947, an uncontrolled search path vulnerability on Windows allows Vim to execute malicious executables placed in the current working directory for the current edited file. On Windows, when using cmd.exe as a shell, Vim resolves external commands by searching the current working directory before system paths. When Vim invokes tools such as findstr for :grep, external commands or filters via :!, or compiler/:make commands, it may inadvertently run a malicious executable present in the same directory as the file being edited. The issue affects Vim for Windows prior to version 9.1.1947.

An uncontrolled search-path vulnerability in Vim for Microsoft Windows allows an attacker who can place a trojanized executable in a directory opened by the user to cause Vim to run that executable when Vim invokes external commands (for example :grep, :!, filters !, :make, or system() in Vimscript). This can result in arbitrary code execution with the privileges of the user running Vim. The issue only affects Vim on Windows platforms (ms-win builds) and is not triggered on Unix-like systems.

Отчет

This flaw is specific to Vim on Microsoft Windows systems and arises from Windows-only search-path behavior when external commands are invoked. The vulnerable code path does not exist in Vim builds for Linux. As a result, Red Hat products are not affected by this vulnerability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 10vimNot affected
Red Hat Enterprise Linux 6vimNot affected
Red Hat Enterprise Linux 7vimNot affected
Red Hat Enterprise Linux 8vimNot affected
Red Hat Enterprise Linux 9vimNot affected
Red Hat OpenShift Container Platform 4rhcosNot affected

Показывать по

Дополнительная информация

Дефект:
CWE-427
https://bugzilla.redhat.com/show_bug.cgi?id=2418541vim: Vim for Windows: Uncontrolled search path vulnerability allows arbitrary code execution

EPSS

Процентиль: 4%
0.00016
Низкий

0 Low

CVSS3

Связанные уязвимости

CVSS3: 7.8
ubuntu
4 месяца назад

Vim is an open source, command line text editor. Prior to version 9.1.1947, an uncontrolled search path vulnerability on Windows allows Vim to execute malicious executables placed in the current working directory for the current edited file. On Windows, when using cmd.exe as a shell, Vim resolves external commands by searching the current working directory before system paths. When Vim invokes tools such as findstr for :grep, external commands or filters via :!, or compiler/:make commands, it may inadvertently run a malicious executable present in the same directory as the file being edited. The issue affects Vim for Windows prior to version 9.1.1947.

CVSS3: 7.8
nvd
4 месяца назад

Vim is an open source, command line text editor. Prior to version 9.1.1947, an uncontrolled search path vulnerability on Windows allows Vim to execute malicious executables placed in the current working directory for the current edited file. On Windows, when using cmd.exe as a shell, Vim resolves external commands by searching the current working directory before system paths. When Vim invokes tools such as findstr for :grep, external commands or filters via :!, or compiler/:make commands, it may inadvertently run a malicious executable present in the same directory as the file being edited. The issue affects Vim for Windows prior to version 9.1.1947.

msrc
4 месяца назад

Vim for Windows Uncontrolled Search Path Element Remote Code Execution Vulnerability

CVSS3: 7.8
debian
4 месяца назад

Vim is an open source, command line text editor. Prior to version 9.1. ...

EPSS

Процентиль: 4%
0.00016
Низкий

0 Low

CVSS3

Уязвимость CVE-2025-66476