Description
Improper neutralization of special elements used in a command ('command injection') in Windows Notepad App allows an unauthorized attacker to execute code locally.
Published: 2026-02-10
Score: 7.8 High
EPSS: < 1% Very Low
KEV: No
Impact: Local Code Execution
Action: Apply Patch
AI Analysis

Impact

Windows Notepad contains a command injection weakness (CVE-2026-20841) where special elements in a command are not properly neutralized. This flaw, identified as CWE‑77, permits an attacker who may not be authenticated to run arbitrary commands on the local machine. The impact is the potential for any code to be executed with the permissions of the current user, compromising confidentiality, integrity, or availability of the affected system.

Affected Systems

The vulnerability affects Microsoft Windows Notepad. No specific version ranges are supplied, so any installation of Notepad that has not yet been updated through Microsoft’s security channels could be susceptible.

Risk and Exploitability

The CVSS score of 7.8 indicates that the flaw is high severity, while an EPSS score of less than 1% suggests that the likelihood of exploitation is currently low. The issue is not listed in the CISA KEV catalogue. Attacks would most likely occur in a local context, such as from a malicious document, shortcut, or other user‑initiated action that triggers the vulnerable code path.

Generated by OpenCVE AI on April 15, 2026 at 16:17 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Install the Microsoft patch that addresses CVE‑2026‑20841 through Windows Update or the Microsoft Update Catalog
  • If the update cannot be applied immediately, configure AppLocker or equivalent application whitelisting to block Notepad from executing arbitrary commands until the patch is deployed
  • Enable automatic updates and monitor Microsoft security bulletins to ensure timely application of future fixes

Generated by OpenCVE AI on April 15, 2026 at 16:17 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 25 Feb 2026 14:45:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:microsoft:windows_notepad:*:*:*:*:*:*:*:*

Thu, 12 Feb 2026 19:30:00 +0000

Type Values Removed Values Added
Description Improper neutralization of special elements used in a command ('command injection') in Windows Notepad App allows an unauthorized attacker to execute code over a network. Improper neutralization of special elements used in a command ('command injection') in Windows Notepad App allows an unauthorized attacker to execute code locally.
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C'}

cvssV3_1

{'score': 7.8, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C'}


Wed, 11 Feb 2026 22:15:00 +0000

Type Values Removed Values Added
First Time appeared Microsoft windows Notepad
Vendors & Products Microsoft windows Notepad

Wed, 11 Feb 2026 15:30:00 +0000

Type Values Removed Values Added
References

Tue, 10 Feb 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 10 Feb 2026 18:15:00 +0000

Type Values Removed Values Added
Description Improper neutralization of special elements used in a command ('command injection') in Windows Notepad App allows an unauthorized attacker to execute code over a network.
Title Windows Notepad App Remote Code Execution Vulnerability
First Time appeared Microsoft
Microsoft window Notepad
Weaknesses CWE-77
CPEs cpe:2.3:a:microsoft:window_notepad:*:*:*:*:*:*:*:*
Vendors & Products Microsoft
Microsoft window Notepad
References
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C'}


Subscriptions

Microsoft Window Notepad Windows Notepad
cve-icon MITRE

Status: PUBLISHED

Assigner: microsoft

Published:

Updated: 2026-04-10T13:21:37.089Z

Reserved: 2025-12-03T05:54:20.376Z

Link: CVE-2026-20841

cve-icon Vulnrichment

Updated: 2026-02-11T14:53:10.118Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-10T18:16:22.643

Modified: 2026-02-25T14:32:14.467

Link: CVE-2026-20841

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-15T17:30:10Z

Weaknesses