High severity7.8NVD Advisory· Published Mar 9, 2026· Updated May 6, 2026
CVE-2026-25866
CVE-2026-25866
Description
MobaXterm versions prior to 26.1 contain an uncontrolled search path element vulnerability. The application calls WinExec to execute Notepad++ without a fully qualified executable path when opening remote files. An attacker can exploit the search path behavior by placing a malicious executable earlier in the search order, resulting in arbitrary code execution in the context of the affected user.
Affected products
2- Mobatek/MobaXtermv5Range: 0
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
2- mobaxterm.mobatek.net/download-home-edition.htmlnvdVendor Advisory
- www.vulncheck.com/advisories/mobaxterm-notepad-unquoted-service-pathnvdThird Party Advisory
News mentions
0No linked articles in our index yet.