PT-2026-7330 · Microsoft · Windows Notepad

Alasdair Gorniak

+2

·

Published

2026-02-10

·

Updated

2026-04-29

·

CVE-2026-20841

CVSS v2.0

10

High

VectorAV:N/AC:L/Au:N/C:C/I:C/A:C
Name of the Vulnerable Software and Affected Versions Windows Notepad versions prior to 11.2502.1.0 Windows 10 and Windows 11 versions prior to February 2026 Patch Tuesday
Description A command injection issue exists in the modern Microsoft Store version of the Windows Notepad app due to improper neutralization of special elements used in commands. The flaw is rooted in the application's Markdown rendering and URI handling. An unauthorized attacker can exploit this by tricking a user into opening a specially crafted Markdown (.md) file containing malicious links. When a user interacts with these links (e.g., via Ctrl+Click), the application fails to properly sanitize the input and launches unverified protocols (such as file://, ms-appinstaller://, or UNC paths), allowing the fetching and execution of remote files. This results in remote code execution (RCE) within the security context of the user who opened the file.
Recommendations Update to Notepad version 11.2502.1.0 or later. Deploy February 2026 Microsoft security updates. As a temporary workaround, block notepad.exe execution from network paths. As a temporary workaround, disable the notepad:// URI handler. As a temporary workaround, reassign .txt file association via Group Policy. As a temporary workaround, restrict SMB and WebDAV access.

Exploit

Fix

RCE

Command Injection

Weakness Enumeration

Related Identifiers

BDU:2026-01742
CVE-2026-20841

Affected Products

Windows Notepad