CVE-2026-34714 - Vulnerability Analysis
CriticalCVSS: 9.2Last Updated: March 30, 2026
Vim - Remote Code Execution
Overview
Vim < 9.2.0272 contains a remote code execution caused by %{expr} injection in tabpanel lacking P_MLE, letting attackers execute code immediately upon opening a crafted file, exploit requires opening the crafted file.
Severity & Score
Impact
Attackers can execute arbitrary code immediately by opening a crafted file, potentially leading to full system compromise.
Mitigation
Update to version 9.2.0272 or later.
References
Social Media Activity(4 posts)
š“ CVE-2026-34714 - Critical (9.2) Vim before 9.2.0272 allows code execution that happens immediately upon opening a crafted file in the default configuration, because %{expr} injection occurs with tabpanel lacking P_MLE. š https://www.thehackerwire.com/vulnerability/CVE-2026-34714/ #CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
View original postš“ CVE-2026-34714 - Critical (9.2) Vim before 9.2.0272 allows code execution that happens immediately upon opening a crafted file in the default configuration, because %{expr} injection occurs with tabpanel lacking P_MLE. š https://www.thehackerwire.com/vulnerability/CVE-2026-34714/ #CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
View original postš“ CVE-2026-34714 - Critical (9.2) Vim before 9.2.0272 allows code execution that happens immediately upon opening a crafted file in the default configuration, because %{expr} injection occurs with tabpanel lacking P_MLE. š https://www.thehackerwire.com/vulnerability/CVE-2026-34714/ #CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
View original postš“ CVE-2026-34714 - Critical (9.2) Vim before 9.2.0272 allows code execution that happens immediately upon opening a crafted file in the default configuration, because %{expr} injection occurs with tabpanel lacking P_MLE. š https://www.thehackerwire.com/vulnerability/CVE-2026-34714/ #CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
View original postRelated Resources
Details
- CVE ID
- CVE-2026-34714
- Severity
- Critical
- CVSS Score
- 9.2
- Type
- template_injection
- Status
- new
- EPSS
- 0.0%
- Social Posts
- 4
CWE
- CWE-78
CVSS Metrics
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:L