Vim, a text editor, is vulnerable to potential data loss with zip.vim and special crafted zip files in versions prior to 9.1.1198. The impact is medium because a user must be made to view such an archive with Vim and then press 'x' on such a strange filename. The issue has been fixed as of Vim patch v9.1.1198.
References
| Link | Resource |
|---|---|
| https://github.com/vim/vim/commit/f209dcd3defb95bae21b2740910e6aa7bb940531 | Patch |
| https://github.com/vim/vim/security/advisories/GHSA-693p-m996-3rmf | Vendor Advisory |
| https://security.netapp.com/advisory/ntap-20250502-0001/ | Third Party Advisory |
Configurations
History
No history.
Information
Published : 2025-03-13 17:15
Updated : 2025-08-18 14:14
NVD link : CVE-2025-29768
Mitre link : CVE-2025-29768
CVE.ORG link : CVE-2025-29768
JSON object : View
Products Affected
netapp
- hci_compute_node
- bootstrap_os
vim
- vim
CWE
CWE-88
Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')
