Description
MobaXterm versions prior to 26.1 contain an uncontrolled search path element vulnerability. The application calls WinExec to execute Notepad++ without a fully qualified executable path when opening remote files. An attacker can exploit the search path behavior by placing a malicious executable earlier in the search order, resulting in arbitrary code execution in the context of the affected user.
Published: 2026-03-09
Score: 8.5 High
EPSS: < 1% Very Low
KEV: No
Impact: Arbitrary Code Execution
Action: Patch Immediately
AI Analysis

Impact

MobaXterm versions before 26.1 allow an attacker to run arbitrary code by exploiting an Unquoted Service Path weakness. When the application opens remote files, it calls WinExec on Notepad++ without providing a fully qualified path, meaning the operating system searches the user’s PATH for the executable. An attacker can craft a malicious binary with the same name and place it earlier in the search order, causing it to be executed in the context of the current user. This flaw is a classic example of CWE‑428, where an application runs with a user‑supplied path that is not properly quoted or secured, leading to uncontrolled execution of executables.

Affected Systems

The vulnerability affects the Mobatek MobaXterm client with versions prior to 26.1. Users running these legacy versions on Windows are at risk if they open remote files through the application. The issue is limited to the MobaXterm product itself and does not extend to other applications on the system.

Risk and Exploitability

The CVSS base score of 8.5 indicates a high severity. The EPSS score of less than 1 % suggests that while the flaw is serious, it is not frequently exploited in the wild, possibly due to the need for the attacker to control the remote file system or path ordering. The vulnerability is not listed in CISA’s KEV catalog. An attacker would need to have the ability to place a malicious executable earlier in the PATH before Notepad++ is invoked, which typically requires local or remote file write capabilities. Once achieved, the attacker obtains code execution privileges with the permissions of the user running MobaXterm.

Generated by OpenCVE AI on April 16, 2026 at 03:59 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade MobaXterm to version 26.1 or newer to eliminate the unquoted path behavior.
  • Ensure that any use of launch utilities like WinExec is performed with fully qualified paths or that the PATH environment is restricted so that malicious binaries cannot be found before the intended executable.
  • If an upgrade is not immediately possible, disable or remove the ability to open remote files through the affected application until the full‑path safeguard is implemented.

Generated by OpenCVE AI on April 16, 2026 at 03:59 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 06 May 2026 14:30:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:mobatek:mobaxterm:*:*:*:*:home:*:*:*

Wed, 11 Mar 2026 14:15:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:mobatek:mobaxterm:*:*:*:*:*:*:*:*

Tue, 10 Mar 2026 14:15:00 +0000

Type Values Removed Values Added
First Time appeared Mobatek
Mobatek mobaxterm
Vendors & Products Mobatek
Mobatek mobaxterm

Mon, 09 Mar 2026 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 09 Mar 2026 15:45:00 +0000

Type Values Removed Values Added
Description MobaXterm versions prior to 26.1 contain an uncontrolled search path element vulnerability. The application calls WinExec to execute Notepad++ without a fully qualified executable path when opening remote files. An attacker can exploit the search path behavior by placing a malicious executable earlier in the search order, resulting in arbitrary code execution in the context of the affected user.
Title MobaXterm < 26.1 Notepad++ Unquoted Service Path
Weaknesses CWE-428
References
Metrics cvssV3_1

{'score': 7.8, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}

cvssV4_0

{'score': 8.5, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


Subscriptions

Mobatek Mobaxterm
cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-03-11T13:57:44.185Z

Reserved: 2026-02-06T19:12:03.463Z

Link: CVE-2026-25866

cve-icon Vulnrichment

Updated: 2026-03-09T17:23:43.394Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-09T16:16:18.970

Modified: 2026-05-06T14:23:35.850

Link: CVE-2026-25866

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T04:00:09Z

Weaknesses