Vim is an open source, command line text editor. Prior to 9.1.2148, a stack buffer overflow vulnerability exists in Vim's NetBeans integration when processing the specialKeys command, affecting Vim builds that enable and use the NetBeans feature. The Stack buffer overflow exists in special_keys() (in src/netbeans.c). The while (*tok) loop writes two bytes per iteration into a 64-byte stack buffer (keybuf) with no bounds check. A malicious NetBeans server can overflow keybuf with a single specialKeys command. The issue has been fixed as of Vim patch v9.1.2148.
History

Fri, 13 Feb 2026 22:30:00 +0000

Type Values Removed Values Added
References

Fri, 13 Feb 2026 21:45:00 +0000

Type Values Removed Values Added
First Time appeared Vim
Vim vim
Vendors & Products Vim
Vim vim

Fri, 13 Feb 2026 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 13 Feb 2026 19:30:00 +0000

Type Values Removed Values Added
Description Vim is an open source, command line text editor. Prior to 9.1.2148, a stack buffer overflow vulnerability exists in Vim's NetBeans integration when processing the specialKeys command, affecting Vim builds that enable and use the NetBeans feature. The Stack buffer overflow exists in special_keys() (in src/netbeans.c). The while (*tok) loop writes two bytes per iteration into a 64-byte stack buffer (keybuf) with no bounds check. A malicious NetBeans server can overflow keybuf with a single specialKeys command. The issue has been fixed as of Vim patch v9.1.2148.
Title Vim has a Netbeans specialKeys Stack Buffer Overflow
Weaknesses CWE-121
References
Metrics cvssV3_1

{'score': 5.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-02-13T21:11:26.275Z

Reserved: 2026-02-12T17:10:53.413Z

Link: CVE-2026-26269

cve-icon Vulnrichment

Updated: 2026-02-13T21:11:26.275Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-02-13T20:17:41.377

Modified: 2026-02-13T22:16:11.220

Link: CVE-2026-26269

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-02-13T21:28:25Z