In recent weeks, a security researcher got what seemed unlikely: finding failures that allow you to run remote code in two of the most veteran text editors in the free ecosystem, and did so by taking advantage of the support of an IA assistant to analyze the code and generate concept evidence. The result is not a theoretical vulnerability: in the case of Vim it was enough to open a manipulated file to run commands with the user's privileges, and in GNU Emacs was documented a route of abuse of integration with Git that can also lead to code execution when working on unreliable directories.
The discovery in Vim was described by Hung Nguyen, a researcher at the security firm Calif, after he told the assistant Claude to seek an CERs-type failure (remote code execution) in the editor. The assistant reviewed parts of the source code and pointed to errors in the way Vim processes model calls (modeling), those embedded instructions in the text that indicate how the editor should behave with a file. The investigation found insufficient security checks and a way to avoid the restrictions of the so-called "sandbox," so that a specially prepared file could lead to the execution of commands when opening. The impact was clear: by just opening a malicious file an attacker could run commands with the same permissions as the user running Vim. The problem was reported to the maintainers and quickly solved; the patch is included in version 9.2,0272 of Vim, and the official notice can be found in the safety bulletin of the Vim repository in GitHub ( Vim's safety notice) as well as at the entrance of the researcher himself ( analysis published by Calif).

The case of GNU Emacs is different in mechanics but equally worrying from the user's perspective. Nguyen showed how the integration of Emacs with version control systems (the vc-git module) activates Git operations when opening files, leading to Git being able to read a local configuration as .git / config and run the tool defined in the chore.fsmonitor option. That route allows a file inside a compressed file or directory with a .git / hidden triggers the execution of a program when the user decompresses and opens the text in Emacs. In practice, it is enough to deliver a file or package that includes a .git / config manipulated so that the Emacs default flow runs code without obvious warning signals. Emacs' maintainers have pointed out that the dangerous action is done by Git, so they consider that the correction corresponds to Git, but the researcher's observation is that Emacs automatically activates Git without neutralizing dangerous options or asking for consent, leaving exposed to users who open files in unreliable directories. The technical report with details and concept evidence is available in the public repository of the equipment ( paper on Emacs), and the Git configuration option involved can be read in the official Git documentation ( chore.fsmonitor in git-config).
In addition to technical detail, this episode serves as an example of how IA tools begin to transform research work into security: the assistant Claude not only located risky behaviors in the code, but helped to iterate and polish concept tests to generate reproducible exploits. This flow accelerated the identification of the problem and allowed for faster communication with the maintainers, but also highlights a double tension: the same ability to automate analysis and generate code is useful for defenders and for attackers.

For users and managers there are immediate practical recommendations. In the case of Vim, updating to the parcheed version (9,2,0272) is the most direct and recommended measure; the release label can be found in the Vim repository in GitHub ( launch with the patch). With GNU Emacs, as the correction has not been applied by Emacs developers and the vector depends on Git, it is appropriate to take precautions: avoid opening files from unverified sources without first inspecting them, uncompress files in isolated environments, and configure or disable automatic version status check if working with external content. For those who use Emacs and want to limit automatic interaction with version control, the editor's documentation on version control is a starting point for adjusting behavior ( Emacs manual: version control). As an additional measure, running editors with minimum privileges or in containers / sandbox reduces the impact of such failures.
Beyond patches and mitigations, anecdote raises a greater question about the design of tools that automatically act on potentially hostile content: should editors assume that any directory is reliable and delegate mitigation to other layers (such as Git), or should they first neutralize potentially dangerous options? The researcher himself proposed that Emacs could filter or cancel calls to Git that allow the execution of chore.fsmonitor so that scripts controlled by an attacker are not invoked, a practical solution that reduces the risk even if it does not replace a Git correction.
In short, the combination of a human research with acceleration by IA has helped to discover and repair a serious failure in Vim and to demonstrate a route of abuse in Emacs that continues without a unanimous correction. The lesson for any professional is to keep editors up to date, be careful with files received from unknown sources, and consider additional restrictions (sandboxing, limited privileges and prior review) when working with downloaded content. For those who want to deepen the original analyses, Calif's research and the notices in the relevant repositories are available in the sources mentioned.
Related
More news on the same subject.

18-year-old Ukrainian youth leads a network of infostealers that violated 28,000 accounts and left $250,000 in losses
The Ukrainian authorities, in coordination with US agents. They have focused on an operation of infostealer which, according to the Ukrainian Cyber Police, was allegedly adminis...

The digital signature is in check: Microsoft dismands a service that turned malware into apparently legitimate software
Microsoft announced the disarticulation of a "malware-signing-as-a-service" operation that exploited its device signature system to convert malicious code into seemingly legitim...

A single GitHub workflow token opened the door to the software supply chain
A single GitHub workflow token failed in the rotation and opened the door. This is the central conclusion of the incident in Grafana Labs following the recent wave of malicious ...

WebWorm 2025: the malware that is hidden in Discord and Microsoft Graphh to evade detection
The latest observations by cyber security researchers point to a change in worrying tactics of an actor linked to China known as WebWorm: in 2025 it has incorporated back doors ...

Identity is no longer enough: continuous verification of the device for real-time security
Identity remains the backbone of many security architectures, but today that column is cracking under new pressures: advanced phishing, real-time proxyan authentication kits and...

The dark matter of identity is changing the rules of corporate security
The Identity Gap: Snapshot 2026 report published by Orchid Security puts numbers to a dangerous trend: the "dark matter" of identity - accounts and credentials that are neither ...

PinTheft the public explosion that could give you root on Arch Linux
A new public explosion has brought to the surface again the fragility of the Linux privilege model: the V12 Security team named the failure as PinTheft and published a concept t...