CVE-2025-55157

Vim is an open source, command line text editor. In versions from 9.1.1231 to before 9.1.1400, When processing nested tuples in Vim script, an error during evaluation can trigger a use-after-free in Vim’s internal tuple reference management. Specifically, the tuple_unref() function may access already freed memory due to improper lifetime handling, leading to memory corruption. The exploit requires direct user interaction, as the script must be explicitly executed within Vim. This issue has been patched in version 9.1.1400.
Configurations

Configuration 1 (hide)

cpe:2.3:a:vim:vim:*:*:*:*:*:*:*:*

History

12 Aug 2025, 18:50

Type Values Removed Values Added
CPE cpe:2.3:a:vim:vim:*:*:*:*:*:*:*:*
References () https://github.com/vim/vim/releases/tag/v9.1.1400 - () https://github.com/vim/vim/releases/tag/v9.1.1400 - Patch
References () https://github.com/vim/vim/commit/1307743697bbc46e1518abfea7f89caa95bcaf97 - () https://github.com/vim/vim/commit/1307743697bbc46e1518abfea7f89caa95bcaf97 - Patch
References () https://github.com/vim/vim/security/advisories/GHSA-3r4f-mm4w-wgg6 - () https://github.com/vim/vim/security/advisories/GHSA-3r4f-mm4w-wgg6 - Vendor Advisory
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 8.8
First Time Vim
Vim vim

11 Aug 2025, 23:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-08-11 23:15

Updated : 2025-08-12 18:50


NVD link : CVE-2025-55157

Mitre link : CVE-2025-55157


JSON object : View

Products Affected

vim

  • vim
CWE
CWE-416

Use After Free