| CVE ID | CVE-2025-66476 |
| CVSS SCORE | 7.8, AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H |
| AFFECTED VENDORS |
Vim |
| AFFECTED PRODUCTS |
Vim |
| VULNERABILITY DETAILS |
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Vim for Windows. User interaction is required to exploit this vulnerability in that the target must open a malicious file and perform one of a set of specific actions in the editor. The specific flaw exists within the launching of external executables from the editor process. The product executes a program from an unsecured location. An attacker can leverage this vulnerability to execute code in the context of current user. |
| ADDITIONAL DETAILS |
Vim has issued an update to correct this vulnerability. More details can be found at:
https://github.com/vim/vim/security/advisories/GHSA-g77q-xrww-p834 |
| DISCLOSURE TIMELINE |
|
| CREDIT | Simon Zuckerbraun of Trend Zero Day Initiative |