{
  "threat_severity" : "Important",
  "public_date" : "2026-03-24T19:43:07Z",
  "bugzilla" : {
    "description" : "vim: Vim: Arbitrary code execution via command injection in glob() function",
    "id" : "2450907",
    "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=2450907"
  },
  "cvss3" : {
    "cvss3_base_score" : "7.3",
    "cvss3_scoring_vector" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
    "status" : "verified"
  },
  "cwe" : "CWE-78",
  "details" : [ "Vim is an open source, command line text editor. Prior to version 9.2.0202, a command injection vulnerability exists in Vim's glob() function on Unix-like systems. By including a newline character (\\n) in a pattern passed to glob(), an attacker may be able to execute arbitrary shell commands. This vulnerability depends on the user's 'shell' setting. This issue has been patched in version 9.2.0202.", "A flaw was found in Vim. By including a newline character in a pattern passed to Vim's glob() function, an attacker may be able to execute arbitrary shell commands. This command injection vulnerability allows for arbitrary code execution, depending on the user's shell settings." ],
  "affected_release" : [ {
    "product_name" : "Red Hat Enterprise Linux 10.0 Extended Update Support",
    "release_date" : "2026-04-02T00:00:00Z",
    "advisory" : "RHSA-2026:6502",
    "cpe" : "cpe:/o:redhat:enterprise_linux_eus:10.0",
    "package" : "vim-2:9.1.083-5.el10_0.2"
  }, {
    "product_name" : "Red Hat Enterprise Linux 6 Extended Lifecycle Support  - EXTENSION",
    "release_date" : "2026-04-07T00:00:00Z",
    "advisory" : "RHSA-2026:6725",
    "cpe" : "cpe:/o:redhat:rhel_els:6",
    "package" : "vim-2:7.4.629-5.el6_10.3"
  }, {
    "product_name" : "Red Hat Enterprise Linux 7 Extended Lifecycle Support",
    "release_date" : "2026-04-06T00:00:00Z",
    "advisory" : "RHSA-2026:6617",
    "cpe" : "cpe:/o:redhat:rhel_els:7",
    "package" : "vim-2:7.4.629-8.el7_9.1"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8",
    "release_date" : "2026-04-07T00:00:00Z",
    "advisory" : "RHSA-2026:6915",
    "cpe" : "cpe:/a:redhat:enterprise_linux:8",
    "package" : "vim-2:8.0.1763-22.el8_10.1"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8",
    "release_date" : "2026-04-07T00:00:00Z",
    "advisory" : "RHSA-2026:6915",
    "cpe" : "cpe:/o:redhat:enterprise_linux:8",
    "package" : "vim-2:8.0.1763-22.el8_10.1"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8.2 Advanced Update Support",
    "release_date" : "2026-04-07T00:00:00Z",
    "advisory" : "RHSA-2026:6730",
    "cpe" : "cpe:/a:redhat:rhel_aus:8.2",
    "package" : "vim-2:8.0.1763-13.el8_2.1"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support",
    "release_date" : "2026-04-07T00:00:00Z",
    "advisory" : "RHSA-2026:6729",
    "cpe" : "cpe:/a:redhat:rhel_aus:8.4",
    "package" : "vim-2:8.0.1763-15.el8_4.1"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8.4 Extended Update Support Long-Life Add-On",
    "release_date" : "2026-04-07T00:00:00Z",
    "advisory" : "RHSA-2026:6729",
    "cpe" : "cpe:/a:redhat:rhel_eus_long_life:8.4",
    "package" : "vim-2:8.0.1763-15.el8_4.1"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support",
    "release_date" : "2026-04-07T00:00:00Z",
    "advisory" : "RHSA-2026:6731",
    "cpe" : "cpe:/a:redhat:rhel_aus:8.6",
    "package" : "vim-2:8.0.1763-19.el8_6.5"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8.6 Telecommunications Update Service",
    "release_date" : "2026-04-07T00:00:00Z",
    "advisory" : "RHSA-2026:6731",
    "cpe" : "cpe:/a:redhat:rhel_tus:8.6",
    "package" : "vim-2:8.0.1763-19.el8_6.5"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8.6 Update Services for SAP Solutions",
    "release_date" : "2026-04-07T00:00:00Z",
    "advisory" : "RHSA-2026:6731",
    "cpe" : "cpe:/a:redhat:rhel_e4s:8.6",
    "package" : "vim-2:8.0.1763-19.el8_6.5"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8.8 Telecommunications Update Service",
    "release_date" : "2026-04-07T00:00:00Z",
    "advisory" : "RHSA-2026:6736",
    "cpe" : "cpe:/a:redhat:rhel_tus:8.8",
    "package" : "vim-2:8.0.1763-20.el8_8.1"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8.8 Update Services for SAP Solutions",
    "release_date" : "2026-04-07T00:00:00Z",
    "advisory" : "RHSA-2026:6736",
    "cpe" : "cpe:/a:redhat:rhel_e4s:8.8",
    "package" : "vim-2:8.0.1763-20.el8_8.1"
  }, {
    "product_name" : "Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions",
    "release_date" : "2026-04-06T00:00:00Z",
    "advisory" : "RHSA-2026:6619",
    "cpe" : "cpe:/a:redhat:rhel_e4s:9.0",
    "package" : "vim-2:8.2.2637-16.el9_0.4"
  }, {
    "product_name" : "Red Hat Enterprise Linux 9.2 Update Services for SAP Solutions",
    "release_date" : "2026-04-06T00:00:00Z",
    "advisory" : "RHSA-2026:6620",
    "cpe" : "cpe:/a:redhat:rhel_e4s:9.2",
    "package" : "vim-2:8.2.2637-20.el9_2.1"
  }, {
    "product_name" : "Red Hat Enterprise Linux 9.4 Extended Update Support",
    "release_date" : "2026-04-02T00:00:00Z",
    "advisory" : "RHSA-2026:6540",
    "cpe" : "cpe:/a:redhat:rhel_eus:9.4",
    "package" : "vim-2:8.2.2637-20.el9_4.2"
  }, {
    "product_name" : "Red Hat Enterprise Linux 9.6 Extended Update Support",
    "release_date" : "2026-04-02T00:00:00Z",
    "advisory" : "RHSA-2026:6539",
    "cpe" : "cpe:/a:redhat:rhel_eus:9.6",
    "package" : "vim-2:8.2.2637-22.el9_6.2"
  } ],
  "package_state" : [ {
    "product_name" : "Red Hat Enterprise Linux 10",
    "fix_state" : "Affected",
    "package_name" : "vim",
    "cpe" : "cpe:/o:redhat:enterprise_linux:10"
  }, {
    "product_name" : "Red Hat Enterprise Linux 9",
    "fix_state" : "Affected",
    "package_name" : "vim",
    "cpe" : "cpe:/o:redhat:enterprise_linux:9"
  }, {
    "product_name" : "Red Hat OpenShift Container Platform 4",
    "fix_state" : "Affected",
    "package_name" : "rhcos",
    "cpe" : "cpe:/a:redhat:openshift:4"
  } ],
  "references" : [ "https://www.cve.org/CVERecord?id=CVE-2026-33412\nhttps://nvd.nist.gov/vuln/detail/CVE-2026-33412\nhttps://github.com/vim/vim/commit/645ed6597d1ea896c712cd7ddbb6edee79577e9a\nhttps://github.com/vim/vim/releases/tag/v9.2.0202\nhttps://github.com/vim/vim/security/advisories/GHSA-w5jw-f54h-x46c" ],
  "name" : "CVE-2026-33412",
  "csaw" : false
}