Description
Notepad Next is a cross-platform, reimplementation of Notepad++. Prior to version 0.14, NotepadNext's detectLanguageFromExtension() function interpolates a file's extension directly into a Lua script without sanitization. An attacker can craft a filename whose extension contains Lua code, which executes automatically when the victim opens the file in NotepadNext. Because luaL_openlibs() is called unconditionally, the full os, io, and package libraries are available to the injected code, enabling arbitrary command execution. This issue has been patched in version 0.14.
INFO
Published Date :
2026-05-07T18:14:20.246Z
Last Modified :
2026-05-07T19:00:57.276Z
Source :
GitHub_M
AFFECTED PRODUCTS
The following products are affected by CVE-2026-42214 vulnerability.
| Vendors | Products |
|---|---|
| Dail8859 |
|
REFERENCES
Here, you will find a curated list of external links that provide in-depth information to CVE-2026-42214.