First published: Mon Mar 03 2025(Updated: )
Vim is an open source, command line text editor. Vim is distributed with the tar.vim plugin, that allows easy editing and viewing of (compressed or uncompressed) tar files. Starting with 9.1.0858, the tar.vim plugin uses the ":read" ex command line to append below the cursor position, however the is not sanitized and is taken literally from the tar archive. This allows to execute shell commands via special crafted tar archives. Whether this really happens, depends on the shell being used ('shell' option, which is set using $SHELL). The issue has been fixed as of Vim patch v9.1.1164
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
SUSE Vim | >=9.1.0858<9.1.1164 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2025-27423 is classified as medium risk due to the potential for code execution when using the tar.vim plugin.
To fix CVE-2025-27423, upgrade Vim to a version greater than 9.1.1164.
Vim versions from 9.1.0858 to 9.1.1164 are affected by CVE-2025-27423.
The impact of CVE-2025-27423 includes potential unauthorized code execution through manipulated tar files.
A workaround for CVE-2025-27423 is to disable the tar.vim plugin until Vim is updated.