Vim, a text editor, is vulnerable to potential data loss with zip.vim and special crafted zip files in versions prior to 9.1.1198. The impact is medium because a user must be made to view such an archive with Vim and then press 'x' on such a strange filename. The issue has been fixed as of Vim patch v9.1.1198.
The product constructs a string for a command to be executed by a separate component in another control sphere, but it does not properly delimit the intended arguments, options, or switches within that command string.
Link | Tags |
---|---|
https://github.com/vim/vim/security/advisories/GHSA-693p-m996-3rmf | vendor advisory |
https://github.com/vim/vim/commit/f209dcd3defb95bae21b2740910e6aa7bb940531 | patch |
https://security.netapp.com/advisory/ntap-20250502-0001/ | third party advisory |