CVE-2025-66476

7.8 HIGH
Published: December 02, 2025 Modified: January 30, 2026
View on NVD

Description

Vim is an open source, command line text editor. Prior to version 9.1.1947, an uncontrolled search path vulnerability on Windows allows Vim to execute malicious executables placed in the current working directory for the current edited file. On Windows, when using cmd.exe as a shell, Vim resolves external commands by searching the current working directory before system paths. When Vim invokes tools such as findstr for :grep, external commands or filters via :!, or compiler/:make commands, it may inadvertently run a malicious executable present in the same directory as the file being edited. The issue affects Vim for Windows prior to version 9.1.1947.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

CVSS v3.x Details

0.0 Low Medium High Critical 10.0
Vector String
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
https://github.com/vim/vim/releases/tag/v9.1.1947
Source: security-advisories@github.com
Release Notes
https://github.com/vim/vim/security/advisories/GHSA-g77q-xrww-p834
Source: security-advisories@github.com
Patch Vendor Advisory
http://www.openwall.com/lists/oss-security/2025/12/02/5
Source: af854a3a-2127-422b-91ae-364da2661108
Mailing List Patch Third Party Advisory

4 reference(s) from NVD

Quick Stats

CVSS v3 Score
7.8 / 10.0
EPSS (Exploit Probability)
0.0%
4th percentile
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)

Affected Vendors

vim microsoft