Disaster Windows Notepad Vulnerability Allows Attackers to Execute Malicious Code Remotely

  • Want to keep track of this thread?
    Accounts can bookmark posts, watch threads for updates, and jump back to where you stopped reading.
    Create account
Microsoft has patched a critical remote code execution (RCE) flaw in the Windows Notepad app, tracked as CVE-2026-20841, which could let attackers run malicious code on victims’ machines.

Disclosed on February 10, 2026, Microsoft Patch Tuesday updates, the vulnerability stems from improper neutralization of special elements in commands (CWE-77: Command Injection) and carries a CVSS v3.1 base score of 8.8/10, rated “Important.”

The bug affects the modern Windows Notepad app, available via the Microsoft Store. An unauthorized attacker could exploit it over a network by tricking users into opening a booby-trapped Markdown (.md) file.

Once loaded, a malicious link inside the file prompts the app to handle unverified protocols. Clicking the link triggers Notepad to fetch and execute remote files, injecting arbitrary commands without proper sanitization.

Attackers craft Markdown files with hyperlinks using custom schemes (e.g., mimicking safe protocols but pointing to attacker-controlled servers). When a user opens the file in Notepad and clicks the link, the app processes it naively, leading to command injection.

The payload executes in the logged-in user’s security context, granting attackers the same privileges – from file access to privilege escalation if the user has admin rights.

The patch rolled out via the Microsoft Store for Notepad (build 11.2510+), with full release notes and a direct security update link. Users must update manually or enable auto-updates, as it’s customer action required. Microsoft credits independent researchers Delta Obscura (delta.cyberm.ca) and “chen” for coordinated disclosure.

This flaw underscores risks in everyday apps that handle rich text, such as Markdown, especially as Notepad evolves from a basic editor into a feature-rich tool. While legacy Notepad.exe remains unaffected, the Store version’s popularity amplifies exposure.

Mitigation Steps

  • Update Notepad immediately from the Microsoft Store.
  • Enable automatic app updates in Windows Settings.
  • Avoid opening untrusted Markdown files or clicking links in them.
  • Use an antivirus with behavior-based detection for anomalous protocol handlers.


Link Archive
 
CVE link: https://www.cve.org/CVERecord?id=CVE-2026-20841

Published: 2026-02-10
Updated: 2026-02-11
Title: Windows Notepad App Remote Code Execution Vulnerability

Description​

Improper neutralization of special elements used in a command ('command injection') in Windows Notepad App allows an unauthorized attacker to execute code over a network.

Score: 8.8/10
Versions: affected from 11.0.0 before 11.2510

Attack Vector: Network
Attack Complexity: Low
Privileges Required: None
User Interaction: Required
Scope: Unchanged (runs as user)
Impact: High confidentiality, integrity and availability impact.

Summary: This is a remote, easy-to-trigger vulnerability requiring no login, but it does require a user action. If triggered, it can lead to major compromise (data theft + system modification + downtime).
 
Last edited:
I have no idea why they screwed around with even tabs and that weird sometimes auto-save, sometimes not nonsense. Of all the programs to just leave alone this is the main one.
 
I have no idea why they screwed around with even tabs and that weird sometimes auto-save, sometimes not nonsense. Of all the programs to just leave alone this is the main one.

Make busy work to pretend to develop new shit so shareholders can circlejerk about how the line go up on the graph.
 
Increasingly happier I swapped to Linux. Everyone raised on Windows and afraid to switch: it's never too late to learn. Ubuntu's pretty normie-friendly.
 
Seriously, just download Linux.

If 99% of your time is spent on youtube and the internet, then just get linux. Nothing changes, except it runs smoother, better, faster.
 
And this is just Microsoft and what we can see so far. Cannot wait for the cavalcade of horror stories Big Tech has with Jeets later down the line.

My money is still on Jeets adding stuff onto monitoring tech to make spotting of bobs and vagene even easier.
 
Huh, was wondering why Notepad had kept on insisting that I use copilot on there. Guess I should've just went back to legacy version instead of using Notepad++ (Which also had a fucking attack JFC)
Make busy work to pretend to develop new shit so shareholders can circlejerk about how the line go up on the graph.
Even understanding your explanation I just can't help but to utter "But why?" It's not microsoft word, it doesn't need any kind of effort or changes that even require co-pilot to even work with it. What's the point of even trying to make something out of a text editor that shouldn't even be using 71.1MB in memory. Whatever the case I hope these 'shareholders' can be happy knowing that their lines can keep going up.
 
Back
Top Bottom