CVE-2026-25866
Analyzed Analyzed - Analysis Complete
Uncontrolled Search Path Vulnerability in MobaXterm Enables Code Execution

Publication date: 2026-03-09

Last updated on: 2026-05-06

Assigner: VulnCheck

Description
MobaXterm versions prior to 26.1 contain an uncontrolled search path element vulnerability. The application calls WinExec to execute Notepad++ without a fully qualified executable path when opening remote files. An attacker can exploit the search path behavior by placing a malicious executable earlier in the search order, resulting in arbitrary code execution in the context of the affected user.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-03-09
Last Modified
2026-05-06
Generated
2026-05-07
AI Q&A
2026-03-09
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
mobatek mobaxterm to 26.1 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-428 The product uses a search path that contains an unquoted element, in which the element contains whitespace or other separators. This can cause the product to access resources in a parent path.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

[{'type': 'paragraph', 'content': 'CVE-2026-25866 is a vulnerability in MobaXterm versions prior to 26.1 where the application calls the Windows API function WinExec to launch Notepad++ without specifying a fully qualified executable path when opening remote files.'}, {'type': 'paragraph', 'content': "This improper handling of the executable path allows an attacker to exploit the search path behavior by placing a malicious executable earlier in the system's search order."}, {'type': 'paragraph', 'content': 'As a result, the attacker can execute arbitrary code with the privileges of the affected user.'}] [1]


How can this vulnerability impact me? :

This vulnerability can lead to arbitrary code execution in the context of the affected user, meaning an attacker with local access and the required privileges can run malicious code on your system.

The impact includes high severity risks to confidentiality, integrity, and availability of your system and data.

  • Confidentiality: An attacker could access sensitive information.
  • Integrity: An attacker could modify or corrupt data.
  • Availability: An attacker could disrupt system operations.

How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

I don't know


How can this vulnerability be detected on my network or system? Can you suggest some commands?

[{'type': 'paragraph', 'content': 'The vulnerability involves MobaXterm calling WinExec to execute Notepad++ without a fully qualified path, which can be exploited by placing a malicious executable earlier in the search path. Detection would involve checking the version of MobaXterm installed and verifying if it is prior to version 26.1.'}, {'type': 'paragraph', 'content': 'To detect this vulnerability on your system, you can check the installed MobaXterm version by running the application and viewing its About section or by checking the executable properties.'}, {'type': 'paragraph', 'content': 'Additionally, you can search your system for unquoted service paths or executable calls related to Notepad++ that do not use fully qualified paths.'}, {'type': 'paragraph', 'content': 'Specific commands to help detect this issue might include:'}, {'type': 'list_item', 'content': 'Check MobaXterm version: Run MobaXterm and check the About dialog or use command line to check the version if supported.'}, {'type': 'list_item', 'content': "Search for unquoted paths in services: Use PowerShell command `Get-WmiObject win32_service | where {$_.PathName -like '*notepad++*'} | select Name, PathName` to find services calling Notepad++ without quotes."}, {'type': 'list_item', 'content': 'Check for suspicious executables in directories earlier in the PATH environment variable that could be executed instead of the legitimate Notepad++.'}] [1]


What immediate steps should I take to mitigate this vulnerability?

[{'type': 'paragraph', 'content': 'The primary mitigation step is to update MobaXterm to version 26.1 or later, where the vulnerability has been fixed by using fully qualified executable paths.'}, {'type': 'paragraph', 'content': 'Until the update can be applied, restrict local user privileges to prevent placing malicious executables in directories earlier in the search path.'}, {'type': 'paragraph', 'content': "Additionally, review and harden the system's PATH environment variable to ensure no untrusted directories precede system directories."}, {'type': 'paragraph', 'content': 'Consider monitoring and restricting execution of unauthorized executables in directories that are part of the search path.'}] [1]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart