Description

Notepad Next is a cross-platform, reimplementation of Notepad++. Prior to version 0.14, NotepadNext's detectLanguageFromExtension() function interpolates a file's extension directly into a Lua script without sanitization. An attacker can craft a filename whose extension contains Lua code, which executes automatically when the victim opens the file in NotepadNext. Because luaL_openlibs() is called unconditionally, the full os, io, and package libraries are available to the injected code, enabling arbitrary command execution. This issue has been patched in version 0.14.

INFO

Published Date :

2026-05-07T18:14:20.246Z

Last Modified :

2026-05-07T19:00:57.276Z

Source :

GitHub_M
AFFECTED PRODUCTS

The following products are affected by CVE-2026-42214 vulnerability.

Vendors Products
Dail8859
  • Notepadnext

CVSS Vulnerability Scoring System

Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact