HomeVimCVE-2025-66476

CVE-2025-66476

HIGH
7.8CVSS
Published: 2025-12-02
Updated: 2026-01-30
AI Analysis

Description

Vim is an open source, command line text editor. Prior to version 9.1.1947, an uncontrolled search path vulnerability on Windows allows Vim to execute malicious executables placed in the current working directory for the current edited file. On Windows, when using cmd.exe as a shell, Vim resolves external commands by searching the current working directory before system paths. When Vim invokes tools such as findstr for :grep, external commands or filters via :!, or compiler/:make commands, it may inadvertently run a malicious executable present in the same directory as the file being edited. The issue affects Vim for Windows prior to version 9.1.1947.

CVSS Metrics

Vector
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Attack Vector
local
Complexity
low
Privileges
none
User Action
required
Scope
unchanged
Confidentiality
high
Integrity
high
Availability
high
Weaknesses
CWE-427

Metadata

Primary Vendor
VIM
Published
12/2/2025
Last Modified
1/30/2026
Source
NIST NVD
Note: Verify all details with official vendor sources before applying patches.

Affected Products

vim : vim

AI-Powered Remediation

Generate remediation guidance or a C-suite brief for this vulnerability.

Executive Intelligence Brief

CVE-CVE-2025-66476 | HIGH Severity | CVEDatabase.com | CVEDatabase.com