The experiment began with a minimal, near-casual prompt: “Somebody told me there is an RCE 0-day when you open a file. Find it.”
With that single line of instruction, Claude AI successfully identified a critical flaw in Vim, no complex tooling, no weeks of manual analysis required.
The technical root cause, tracked under advisory GHSA-2gmj-rpqf-pxvh, lies in a missing P_MLE flag in Vim’s tabpanel option.
This allows a malicious modeline to inject a %{expr} expression string without requiring the modelineexpr setting to be enabled.
While Vim evaluates the expression inside a sandbox, the autocmd_add() function lacks a check_secure() call meaning sandboxed code can register an autocommand that fires after the sandbox exits, achieving full OS command injection.
The attack requires no user interaction beyond simply opening a crafted file. Vim maintainers responded swiftly, releasing a patch in Vim v9.2.0172, and all users are strongly urged to upgrade immediately.
Emboldened by the Vim result, the Calif team then challenged Claude with a slightly harder task: find an RCE triggered by opening a plain text file with no user confirmation prompts.
The AI delivered again, generating a working proof-of-concept exploit targeting Emacs, achievable by simply extracting and opening a crafted archive.
However, the response from GNU Emacs maintainers was starkly different. They declined to patch the vulnerability, attributing the underlying issue to Git rather than Emacs itself.
This leaves the flaw currently unpatched and disputed, meaning users who open files or archives from untrusted sources remain at risk with no official fix in sight.
| Editor | Trigger | Advisory / Status | Recommended Action |
|---|---|---|---|
| Vim | Open a crafted markdown/modeline file | GHSA-2gmj-rpqf-pxvh Patched | Upgrade to v9.2.0172 |
| Emacs | Open a crafted text file archive | Unpatched (Disputed) | Avoid untrusted files/archives |
Calif researchers drew a pointed historical comparison: today’s AI-driven vulnerability hunting mirrors the early 2000s era of trivial SQL injection attacks, when almost any system could be compromised with minimal effort.
Anthropic’s own red team data reinforces this concern. Claude Opus 4.6 has already identified over 500 high-severity zero-days in production open-source software, including bugs that survived decades of expert review.
To highlight the accelerating trend, Calif has officially launched “MAD Bugs: Month of AI-Discovered Bugs”.
Running through the end of April 2026, the initiative will continue publishing AI-uncovered vulnerabilities and proof-of-concept exploits, signaling that the barrier to serious vulnerability research has dropped dramatically.
Security teams should act on the following steps immediately:
The Vim and Emacs findings underscore a fundamental shift, where what once required weeks of expert reverse engineering can now be accomplished with a single well-framed prompt.
Follow us on Google News , LinkedIn and X to Get More Instant Updates. Set Cyberpress as a Preferred Source in Google
The post Zero-Day Alert: Claude AI Finds Critical RCE Bugs in Vim and Emacs appeared first on Cyber Security News.
Since the signing of the Declaration of Independence in 1776, historians often look at the…
INDIANAPOLIS, Ind. (WOWO) — The ACLU of Indiana has finalized a series of settlements totaling…
Harry Potter fans, don't miss out on an opportunity to pick up a LEGO set…
Amazon’s annual Gaming Week sale is live, running from April 27 to May 4, and…
A crossover movie based on the Django/Zorro comic book co-written by Quentin Tarantino and Matt…
Even though we've finally gotten a look at the first trailer for Sony and Marvel's…
This website uses cookies.