Monitor vulnerabilities like this one. Sign up free to get alerted when software you use is affected.

Vim text editor's NetBeans integration has a buffer overflow flaw

OESA-2026-1501
Summary

A security patch is available for the Vim text editor to fix a bug that could allow a malicious NetBeans server to crash the editor or potentially execute malicious code. This affects specific versions of Vim that have the NetBeans feature enabled. To stay safe, update to the latest version of Vim, version 9.1.2148 or later.

What to do
  • Update vim to version 9.0-39.oe2003sp4.
Affected software
VendorProductAffected versionsFix available
– vim <= 9.0-39.oe2003sp4 9.0-39.oe2003sp4
Original title
vim security update
Original description
Vim is an advanced text editor that seeks to provide the power of the de-facto Unix editor &amp;apos;Vi&amp;apos;, with a more complete feature set. Vim is a highly configurable text editor built to enable efficient text editing. It is an improved version of the vi editor distributed with most UNIX systems.

Security Fix(es):

Vim is an open source, command line text editor. Prior to 9.1.2148, a stack buffer overflow vulnerability exists in Vim&apos;s NetBeans integration when processing the specialKeys command, affecting Vim builds that enable and use the NetBeans feature. The Stack buffer overflow exists in special_keys() (in src/netbeans.c). The while (*tok) loop writes two bytes per iteration into a 64-byte stack buffer (keybuf) with no bounds check. A malicious NetBeans server can overflow keybuf with a single specialKeys command. The issue has been fixed as of Vim patch v9.1.2148.(CVE-2026-26269)
Published: 6 Mar 2026 · Updated: 6 Mar 2026 · First seen: 6 Mar 2026