CVEInsight.
TrendingZero-DayExploreBrowseSearchSaved
CVEInsight.

Free vulnerability intelligence for developers, security teams, and researchers. Data sourced from public databases for informational purposes only.

Explore

HomeTrendingZero-Day WatchAttack TypesBrowse CVEsSearch

Legal

Privacy PolicyTerms of ServiceData Disclaimer

© 2026CVEInsight. For informational use only — not a substitute for professional security advice.

CVE data sourced from NVD / NIST & public disclosures.

gnu

emacs

13 known vulnerabilities · sorted by CVSS score

CVE-2022-48337
CRITICAL9.8

GNU Emacs through 28.2 allows attackers to execute commands via shell metacharacters in the name of a source-code file, because lib-src/etags.c uses the system C library function in its implementation of the etags program. For example, a victim may use the "etags -u *" command (suggested in the etags documentation) in a situation where the current working directory has contents that depend on untrusted input.

gnu / emacs+1
Network
Published Feb 20, 2023
CVE-2024-39331
CRITICAL9.8

In Emacs before 29.4, org-link-expand-abbrev in lisp/ol.el expands a %(...) link abbrev even when it specifies an unsafe function, such as shell-command-to-string. This affects Org Mode before 9.7.5.

gnu / emacs
Network
Published Jun 23, 2024
CVE-2024-30202
HIGH7.8

In Emacs before 29.3, arbitrary Lisp code is evaluated as part of turning on Org mode. This affects Org Mode before 9.6.23.

gnu / emacs+1
Local
Published Mar 25, 2024
CVE-2023-27986
HIGH7.8

emacsclient-mail.desktop in Emacs 28.1 through 28.2 is vulnerable to Emacs Lisp code injections through a crafted mailto: URI with unescaped double-quote characters. It is fixed in 29.0.90.

gnu / emacs
Local
Published Mar 9, 2023
CVE-2023-2491
HIGH7.8

A flaw was found in the Emacs text editor. Processing a specially crafted org-mode code with the "org-babel-execute:latex" function in ob-latex.el can result in arbitrary command execution. This CVE exists because of a CVE-2023-28617 security regression for the emacs package in Red Hat Enterprise Linux 8.8 and Red Hat Enterprise Linux 9.2.

gnu / emacs+8
Local
Published May 17, 2023
CVE-2022-48339
HIGH7.8

An issue was discovered in GNU Emacs through 28.2. htmlfontify.el has a command injection vulnerability. In the hfy-istext-command function, the parameter file and parameter srcdir come from external input, and parameters are not escaped. If a file name or directory name contains shell metacharacters, code may be executed.

gnu / emacs
Local
Published Feb 20, 2023
CVE-2022-45939
HIGH7.8

GNU Emacs through 28.2 allows attackers to execute commands via shell metacharacters in the name of a source-code file, because lib-src/etags.c uses the system C library function in its implementation of the ctags program. For example, a victim may use the "ctags *" command (suggested in the ctags documentation) in a situation where the current working directory has contents that depend on untrusted input.

gnu / emacs+4
Local
Published Nov 28, 2022
CVE-2024-53920
HIGH7.8

In elisp-mode.el in GNU Emacs before 30.1, a user who chooses to invoke elisp-completion-at-point (for code completion) on untrusted Emacs Lisp source code can trigger unsafe Lisp macro expansion that allows attackers to execute arbitrary code. (This unsafe expansion also occurs if a user chooses to enable on-the-fly diagnosis that byte compiles untrusted Emacs Lisp source code.)

gnu / emacs
Local
Published Nov 27, 2024
CVE-2023-27985
HIGH7.8

emacsclient-mail.desktop in Emacs 28.1 through 28.2 is vulnerable to shell command injections through a crafted mailto: URI. This is related to lack of compliance with the Desktop Entry Specification. It is fixed in 29.0.90

gnu / emacs
Local
Published Mar 9, 2023
CVE-2022-48338
HIGH7.3

An issue was discovered in GNU Emacs through 28.2. In ruby-mode.el, the ruby-find-library-file function has a local command injection vulnerability. The ruby-find-library-file function is an interactive function, and bound to C-c C-f. Inside the function, the external command gem is called through shell-command-to-string, but the feature-name parameters are not escaped. Thus, malicious Ruby source files may cause commands to be executed.

gnu / emacs
Local
Published Feb 20, 2023
CVE-2024-30205
HIGH7.1

In Emacs before 29.3, Org mode considers contents of remote files to be trusted. This affects Org Mode before 9.6.23.

gnu / emacs+2
Local
Published Mar 25, 2024
CVE-2024-30203
MEDIUM5.5

In Emacs before 29.3, Gnus treats inline MIME contents as trusted.

gnu / emacs+2
Local
Published Mar 25, 2024
CVE-2024-30204
LOW2.8

In Emacs before 29.3, LaTeX preview is enabled by default for e-mail attachments.

gnu / emacs+2
Local
Published Mar 25, 2024