Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-2538: Uncontrolled Search Path in Flos Freeware Notepad2

0
High
VulnerabilityCVE-2026-2538cvecve-2026-2538
Published: Mon Feb 16 2026 (02/16/2026, 06:02:06 UTC)
Source: CVE Database V5
Vendor/Project: Flos Freeware
Product: Notepad2

Description

A security flaw has been discovered in Flos Freeware Notepad2 4.2.22/4.2.23/4.2.24/4.2.25. Affected is an unknown function in the library Msimg32.dll. Performing a manipulation results in uncontrolled search path. Attacking locally is a requirement. The attack's complexity is rated as high. The exploitability is told to be difficult. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

AILast updated: 02/16/2026, 06:33:29 UTC

Technical Analysis

CVE-2026-2538 is a vulnerability identified in Flos Freeware Notepad2 versions 4.2.22 to 4.2.25, specifically related to an uncontrolled search path issue within the Msimg32.dll library. This vulnerability arises when the application loads DLLs or other resources without properly validating or controlling the search path, allowing an attacker with local access to influence which DLL is loaded. The attack complexity is high, indicating that exploitation requires detailed knowledge and specific conditions, and the exploitability is difficult. The attacker must have at least limited privileges on the local machine but does not require user interaction or elevated authentication. Successful exploitation could lead to execution of arbitrary code with the privileges of the Notepad2 process, potentially enabling privilege escalation or persistence on the system. The vendor was notified early but has not issued any response or patch, and no known exploits are currently in the wild. The vulnerability has a CVSS 4.0 score of 7.3, reflecting its high severity primarily due to the potential impact on confidentiality, integrity, and availability, combined with the local attack vector and high complexity. The lack of patch availability increases the risk for organizations relying on these versions of Notepad2. Given that Notepad2 is a lightweight text editor often used in development and administrative contexts, the vulnerability could be leveraged in multi-user environments or by malicious insiders.

Potential Impact

For European organizations, the impact of CVE-2026-2538 could be significant in environments where Notepad2 is used, especially in IT, development, or administrative roles where local access is common. An attacker with local access could exploit this vulnerability to execute arbitrary code, potentially leading to privilege escalation or unauthorized persistence. This could compromise sensitive data, disrupt operations, or serve as a foothold for further attacks within the network. Organizations with shared workstations, remote desktop environments, or insufficient local access controls are particularly at risk. The absence of a vendor patch means that the vulnerability remains exploitable, increasing the window of exposure. While the attack complexity is high and exploitation is difficult, insider threats or attackers who have already gained limited access could leverage this flaw to escalate privileges or move laterally. This could impact confidentiality, integrity, and availability of systems and data, especially in sectors with stringent data protection requirements such as finance, healthcare, and government.

Mitigation Recommendations

1. Restrict local access to systems running affected versions of Notepad2, ensuring only trusted users have login permissions. 2. Employ application whitelisting and restrict execution of unauthorized DLLs or binaries in user directories to prevent malicious DLL injection. 3. Monitor system logs and use endpoint detection and response (EDR) tools to detect unusual DLL loading or process behavior related to Notepad2. 4. Consider temporarily replacing Notepad2 with alternative, actively maintained text editors that do not exhibit this vulnerability. 5. Implement strict file system permissions to prevent unauthorized users from placing malicious DLLs in directories searched by Notepad2. 6. Educate users about the risks of running untrusted code locally and enforce least privilege principles. 7. Regularly audit installed software versions and maintain an inventory to quickly identify vulnerable instances. 8. Stay alert for vendor updates or community patches and apply them promptly once available.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-02-15T09:24:12.532Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6992b6dfbda29fb02f4dd9f4

Added to database: 2/16/2026, 6:19:11 AM

Last enriched: 2/16/2026, 6:33:29 AM

Last updated: 2/16/2026, 12:40:31 PM

Views: 13

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats