FreeBSD VuXML: Documenting security issues in FreeBSD and the FreeBSD Ports Collection

vim -- Improper Input Validation in Vim

Affected packages
vim < 9.1.1164
vim-gtk2 < 9.1.1164
vim-gtk3 < 9.1.1164
vim-motif < 9.1.1164
vim-tiny < 9.1.1164
vim-x11 < 9.1.1164

Details

VuXML ID 2ec7816d-fdb7-11ef-91ff-b42e991fc52e
Discovery 2025-03-03
Entry 2025-03-10

security-advisories@github.com reports:

Vim is distributed with the tar.vim plugin, that allows easy editing and viewing of (compressed or uncompressed) tar files. Starting with 9.1.0858, the tar.vim plugin uses the ":read" ex command line to append below the cursor position, however the is not sanitized and is taken literally from the tar archive. This allows to execute shellcommands via special crafted tar archives. Whether this really happens, depends on the shell being used ('shell' option, which is set using $SHELL).

References

CVE Name CVE-2025-27423
URL https://nvd.nist.gov/vuln/detail/CVE-2025-27423