Monitor vulnerabilities like this one. Sign up free to get alerted when software you use is affected.

Vim Text Editor May Crash or Be Exploited by Malicious Servers

OESA-2026-1498
Summary

Vim's NetBeans integration can be exploited by a malicious server to crash or take control of the text editor. This is fixed in version 9.1.2148, so update your Vim to this version or later to be protected.

What to do
  • Update vim to version 9.0.2092-25.oe2403.
Affected software
VendorProductAffected versionsFix available
– vim <= 9.0.2092-25.oe2403 9.0.2092-25.oe2403
Original title
vim security update
Original description
Vim is an advanced text editor that seeks to provide the power of the de-facto Unix editor &amp;apos;Vi&amp;apos;, with a more complete feature set. Vim is a highly configurable text editor built to enable efficient text editing. It is an improved version of the vi editor distributed with most UNIX systems.

Security Fix(es):

Vim is an open source, command line text editor. Prior to 9.1.2148, a stack buffer overflow vulnerability exists in Vim&apos;s NetBeans integration when processing the specialKeys command, affecting Vim builds that enable and use the NetBeans feature. The Stack buffer overflow exists in special_keys() (in src/netbeans.c). The while (*tok) loop writes two bytes per iteration into a 64-byte stack buffer (keybuf) with no bounds check. A malicious NetBeans server can overflow keybuf with a single specialKeys command. The issue has been fixed as of Vim patch v9.1.2148.(CVE-2026-26269)
Published: 6 Mar 2026 · Updated: 6 Mar 2026 · First seen: 6 Mar 2026