Cyber Posture

CVE-2026-28417

Medium

Published: 27 February 2026

Published
27 February 2026
Modified
03 March 2026
KEV Added
Patch
27 February 2026
CVSS Score 4.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
EPSS Score 0.0001 2.8th percentile
Risk Priority 9 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-28417 is a medium-severity Improper Neutralization of Invalid Characters in Identifiers in Web Pages (CWE-86) vulnerability in Vim Vim. Its CVSS base score is 4.4 (Medium).

Operationally, exploitation aligns with the MITRE ATT&CK technique Malicious Link (T1204.001); ranked at the 2.8th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

Threat & Defense at a Glance

What attackers do: exploitation maps to Malicious Link (T1204.001) and 1 other technique.
Threat & Defense Details

Likely Mitigating ControlsAI

Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.

addresses: CWE-78

Platform-independent apps typically execute inside a managed runtime or sandbox that restricts direct OS command execution, reducing the ability to exploit OS command injection.

addresses: CWE-78

Validates inputs to block special elements that would alter OS command execution.

MITRE ATT&CK Enterprise TechniquesAI

T1204.001 Malicious Link Execution
An adversary may rely upon a user clicking a malicious link in order to gain execution.
T1059.004 Unix Shell Execution
Adversaries may abuse Unix shell commands and scripts for execution.
Why these techniques?

OS command injection in Vim netrw allows arbitrary Unix shell execution (T1059.004) when a user is tricked into opening a crafted scp:// URL (T1204.001).

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

Vim is an open source, command line text editor. Prior to version 9.2.0073, an OS command injection vulnerability exists in the `netrw` standard plugin bundled with Vim. By inducing a user to open a crafted URL (e.g., using the `scp://`…

more

protocol handler), an attacker can execute arbitrary shell commands with the privileges of the Vim process. Version 9.2.0073 fixes the issue.

Deeper analysisAI

CVE-2026-28417 is an OS command injection vulnerability in the netrw standard plugin bundled with Vim, an open source command-line text editor. The flaw affects Vim versions prior to 9.2.0073 and is classified under CWE-86 (Improper Neutralization of Invalid Characters in Identifiers in Web Pages) and CWE-78 (Improper Neutralization of Special Elements used in an OS Command). It carries a CVSS v3.1 base score of 4.4 (AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N), indicating a moderate severity with local access, low attack complexity, no privileges required, user interaction needed, and limited impact on confidentiality and integrity.

An attacker can exploit this vulnerability by inducing a victim to open a crafted URL within Vim, such as one using the scp:// protocol handler. This social engineering tactic tricks Vim's netrw plugin into processing the malicious URL, allowing the execution of arbitrary shell commands with the privileges of the running Vim process. Exploitation requires local access to the system and user interaction, but no prior privileges, making it feasible in scenarios where users routinely open untrusted files or URLs in Vim.

Vim version 9.2.0073 addresses the issue with a targeted fix, as detailed in the upstream commit at https://github.com/vim/vim/commit/79348dbbc09332130f4c860 and the release notes at https://github.com/vim/vim/releases/tag/v9.2.0073. The GitHub security advisory (https://github.com/vim/vim/security/advisories/GHSA-m3xh-9434-g336) and an oss-security mailing list post (http://www.openwall.com/lists/oss-security/2026/02/27/6) confirm the patch and recommend immediate upgrading to mitigate the command injection risk.

Details

CWE(s)

Affected Products

vim
vim
≤ 9.2.0073

CVEs Like This One

CVE-2026-33412Same product: Vim Vim
CVE-2026-34714Same product: Vim Vim
CVE-2026-34982Same product: Vim Vim
CVE-2026-39881Same product: Vim Vim
CVE-2026-26269Same product: Vim Vim
CVE-2026-35177Same product: Vim Vim
CVE-2026-28421Same product: Vim Vim
CVE-2025-27423Same product: Vim Vim
CVE-2025-1215Same product: Vim Vim
CVE-2026-1460Shared CWE-78

References