Vimに重大な脆弱性 ファイルを開くだけでコマンド実行:セキュリティニュースアラート - ITmedia エンタープライズ
https://www.itmedia.co.jp/enterprise/articles/2604/01/news037.htmlThe evidence pack includes HTML, screenshots, summaries, and metadata. It can be downloaded on Pro.
Vimに重大な脆弱性 ファイルを開くだけでコマンド実行:セキュリティニュースアラート - ITmedia エンタープライズ
Open the archived HTML with saved-time metadata attached.
This HTML has CSS and images embedded, so it can still be opened even if the original page disappears.
This page reports a critical vulnerability in Vim text editor. A flaw in the tabpanel option and modeline feature allows arbitrary OS commands to execute simply by opening a specially crafted file. Multiple processing defects combine to bypass sandbox restrictions. The vulnerability results from missing validation in tabpanel configuration and defects in automatic command registration. Severity is rated as "high." The issue was disclosed by the Vim project on March 30, 2026, affecting Vim versions prior to 9.2.0272.
