Notepad Next is a cross-platform, reimplementation of Notepad++. Prior to version 0.14, NotepadNext's detectLanguageFromExtension() function interpolates a file's extension directly into a Lua script without sanitization. An attacker can craft a filename whose extension contains Lua code, which executes automatically when the victim opens the file in NotepadNext. Because luaL_openlibs() is called unconditionally, the full os, io, and package libraries are available to the injected code, enabling arbitrary command execution. This issue has been patched in version 0.14.
History

Thu, 07 May 2026 21:45:00 +0000

Type Values Removed Values Added
First Time appeared Dail8859
Dail8859 notepadnext
Vendors & Products Dail8859
Dail8859 notepadnext

Thu, 07 May 2026 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 07 May 2026 19:00:00 +0000

Type Values Removed Values Added
Description Notepad Next is a cross-platform, reimplementation of Notepad++. Prior to version 0.14, NotepadNext's detectLanguageFromExtension() function interpolates a file's extension directly into a Lua script without sanitization. An attacker can craft a filename whose extension contains Lua code, which executes automatically when the victim opens the file in NotepadNext. Because luaL_openlibs() is called unconditionally, the full os, io, and package libraries are available to the injected code, enabling arbitrary command execution. This issue has been patched in version 0.14.
Title Improper Control of Generation of Code ('Code Injection') in dail8859/NotepadNext
Weaknesses CWE-94
References
Metrics cvssV3_1

{'score': 7.8, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-05-07T19:00:57.276Z

Reserved: 2026-04-25T05:04:37.028Z

Link: CVE-2026-42214

cve-icon Vulnrichment

Updated: 2026-05-07T19:00:53.424Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-05-07T19:16:01.497

Modified: 2026-05-07T20:16:43.850

Link: CVE-2026-42214

cve-icon Redhat

No data.