Description
A security flaw has been discovered in Flos Freeware Notepad2 4.2.25. This affects an unknown function in the library PROPSYS.dll. Performing a manipulation results in uncontrolled search path. The attack is only possible with local access. The attack is considered to have high complexity. The exploitability is reported as difficult. The vendor was contacted early about this disclosure but did not respond in any way.
Published: 2026-03-22
Score: 7.3 High
EPSS: < 1% Very Low
KEV: No
Impact: Local code execution via DLL hijack
Action: Patch
AI Analysis

Impact

The flaw resides in the PROPSYS.dll library used by Flos Freeware Notepad2. Because the library does not enforce a secure search path, a local user can place a malicious DLL in a directory that the system prefers during loading. When the application loads the library, it will execute code from the attacker‑supplied DLL, effectively leading to code execution on the victim machine.

Affected Systems

The vulnerability affects Flos Freeware Notepad2 version 4.2.25. No other versions are listed, so systems running that specific release are at risk.

Risk and Exploitability

The CVSS base score of 7.3 indicates high severity. While EPSS data is unavailable and the issue is not listed in CISA's KEV catalog, the local‑only attack surface means an attacker must have physical or administrative access to the target machine. The attack requires write access to search‑path directories and is considered difficult to exploit, but once a malicious DLL is in place, the impact is full code execution.

Generated by OpenCVE AI on March 22, 2026 at 12:20 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update Notepad2 to the latest version once a patch is released.
  • If no patch is available, scan the system for malicious DLLs in directories searched by PROPSYS.dll and remove any that are not part of the legitimate installation.
  • Restrict write permissions on directories that PROPSYS.dll uses during load operations to prevent an attacker from placing a forged DLL.
  • Monitor system logs for DLL load events that indicate an unauthorized DLL was loaded.
  • Contact Flos Freeware to express the need for an urgent response and follow up for a patch.

Generated by OpenCVE AI on March 22, 2026 at 12:20 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 30 Apr 2026 14:30:00 +0000

Type Values Removed Values Added
First Time appeared Flos-freeware
Flos-freeware notepad2
CPEs cpe:2.3:a:flos-freeware:notepad2:4.2.25:*:*:*:*:*:*:*
Vendors & Products Flos-freeware
Flos-freeware notepad2

Tue, 24 Mar 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 23 Mar 2026 10:00:00 +0000

Type Values Removed Values Added
First Time appeared Flos Freeware
Flos Freeware notepad2
Vendors & Products Flos Freeware
Flos Freeware notepad2

Sun, 22 Mar 2026 11:30:00 +0000

Type Values Removed Values Added
Description A security flaw has been discovered in Flos Freeware Notepad2 4.2.25. This affects an unknown function in the library PROPSYS.dll. Performing a manipulation results in uncontrolled search path. The attack is only possible with local access. The attack is considered to have high complexity. The exploitability is reported as difficult. The vendor was contacted early about this disclosure but did not respond in any way.
Title Flos Freeware Notepad2 PROPSYS.dll uncontrolled search path
Weaknesses CWE-426
CWE-427
References
Metrics cvssV2_0

{'score': 6, 'vector': 'AV:L/AC:H/Au:S/C:C/I:C/A:C/E:ND/RL:ND/RC:UR'}

cvssV3_0

{'score': 7, 'vector': 'CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:X/RL:X/RC:R'}

cvssV3_1

{'score': 7, 'vector': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:X/RL:X/RC:R'}

cvssV4_0

{'score': 7.3, 'vector': 'CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X'}


Subscriptions

Flos-freeware Notepad2
Flos Freeware Notepad2
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-03-24T14:34:17.765Z

Reserved: 2026-03-21T16:44:00.664Z

Link: CVE-2026-4545

cve-icon Vulnrichment

Updated: 2026-03-24T14:34:13.074Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-22T12:16:03.963

Modified: 2026-04-30T14:25:09.363

Link: CVE-2026-4545

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-25T14:46:31Z

Weaknesses