The experiment began with a minimal, near-casual prompt: “Somebody told me there is an RCE 0-day when you open a file. Find it.”
With that single line of instruction, Claude AI successfully identified a critical flaw in Vim, no complex tooling, no weeks of manual analysis required.
The technical root cause, tracked under advisory GHSA-2gmj-rpqf-pxvh, lies in a missing P_MLE flag in Vim’s tabpanel option.
This allows a malicious modeline to inject a %{expr} expression string without requiring the modelineexpr setting to be enabled.
While Vim evaluates the expression inside a sandbox, the autocmd_add() function lacks a check_secure() call meaning sandboxed code can register an autocommand that fires after the sandbox exits, achieving full OS command injection.
The attack requires no user interaction beyond simply opening a crafted file. Vim maintainers responded swiftly, releasing a patch in Vim v9.2.0172, and all users are strongly urged to upgrade immediately.
Emboldened by the Vim result, the Calif team then challenged Claude with a slightly harder task: find an RCE triggered by opening a plain text file with no user confirmation prompts.
The AI delivered again, generating a working proof-of-concept exploit targeting Emacs, achievable by simply extracting and opening a crafted archive.
However, the response from GNU Emacs maintainers was starkly different. They declined to patch the vulnerability, attributing the underlying issue to Git rather than Emacs itself.
This leaves the flaw currently unpatched and disputed, meaning users who open files or archives from untrusted sources remain at risk with no official fix in sight.
| Editor | Trigger | Advisory / Status | Recommended Action |
|---|---|---|---|
| Vim | Open a crafted markdown/modeline file | GHSA-2gmj-rpqf-pxvh Patched | Upgrade to v9.2.0172 |
| Emacs | Open a crafted text file archive | Unpatched (Disputed) | Avoid untrusted files/archives |
Calif researchers drew a pointed historical comparison: today’s AI-driven vulnerability hunting mirrors the early 2000s era of trivial SQL injection attacks, when almost any system could be compromised with minimal effort.
Anthropic’s own red team data reinforces this concern. Claude Opus 4.6 has already identified over 500 high-severity zero-days in production open-source software, including bugs that survived decades of expert review.
To highlight the accelerating trend, Calif has officially launched “MAD Bugs: Month of AI-Discovered Bugs”.
Running through the end of April 2026, the initiative will continue publishing AI-uncovered vulnerabilities and proof-of-concept exploits, signaling that the barrier to serious vulnerability research has dropped dramatically.
Security teams should act on the following steps immediately:
The Vim and Emacs findings underscore a fundamental shift, where what once required weeks of expert reverse engineering can now be accomplished with a single well-framed prompt.
Follow us on Google News , LinkedIn and X to Get More Instant Updates. Set Cyberpress as a Preferred Source in Google
The post Zero-Day Alert: Claude AI Finds Critical RCE Bugs in Vim and Emacs appeared first on Cyber Security News.
STEUBEN COUNTY, Ind. (WOWO) — A proposed casino in Steuben County could generate up to…
FORT WAYNE, Ind. (WOWO)— A Fort Wayne man is facing a misdemeanor public indecency charge…
FORT WAYNE, IND. (WOWO) Allen County is continuing its multi-year effort to consolidate fire and…
Michelle McConaghy wants to normalize hearing loss. It’s something that affects far more people than…
Saint-Gobain Performance Plastics, which has been linked to the contamination of water supplies in southern…
Evelyn Konig doesn’t hide her faith. In fact, it’s stamped all over the pregnancy resource…
This website uses cookies.