Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-25866: CWE-428 Unquoted search path or element in Mobatek MobaXterm

0
High
VulnerabilityCVE-2026-25866cvecve-2026-25866cwe-428
Published: Mon Mar 09 2026 (03/09/2026, 15:24:47 UTC)
Source: CVE Database V5
Vendor/Project: Mobatek
Product: MobaXterm

Description

MobaXterm versions prior to 26.1 contain an uncontrolled search path element vulnerability. The application calls WinExec to execute Notepad++ without a fully qualified executable path when opening remote files. An attacker can exploit the search path behavior by placing a malicious executable earlier in the search order, resulting in arbitrary code execution in the context of the affected user.

AI-Powered Analysis

AILast updated: 03/09/2026, 16:07:01 UTC

Technical Analysis

CVE-2026-25866 is an unquoted search path vulnerability (CWE-428) affecting Mobatek's MobaXterm software versions prior to 26.1. The vulnerability arises because MobaXterm calls the Windows API function WinExec to execute Notepad++ without specifying the full path to the executable. Windows resolves executable paths by searching directories in a predefined order, and if the path is unquoted and contains spaces, an attacker can place a malicious executable with the same name in a directory that appears earlier in the search order. When MobaXterm attempts to launch Notepad++, the malicious executable is run instead, resulting in arbitrary code execution under the context of the logged-in user. This flaw requires the attacker to have local access or the ability to write files to directories in the search path, but it does not require user interaction or elevated privileges beyond limited user rights. The vulnerability has a CVSS 4.0 base score of 8.5, reflecting its high impact on confidentiality, integrity, and availability, as well as its relatively low complexity to exploit. No public exploits are known at this time, but the risk remains significant due to the widespread use of MobaXterm in IT environments for remote administration and file management.

Potential Impact

The primary impact of CVE-2026-25866 is the potential for arbitrary code execution with the privileges of the affected user, which can lead to full compromise of the user's session and potentially lateral movement within an organization’s network. Since MobaXterm is widely used by system administrators and IT professionals for remote access and file operations, exploitation could allow attackers to implant persistent backdoors, steal credentials, or disrupt critical operations. The vulnerability affects confidentiality by enabling unauthorized code execution, integrity by allowing modification or replacement of executables, and availability by potentially causing denial of service or system instability. Organizations relying heavily on MobaXterm for remote management, especially those with sensitive or critical infrastructure, face increased risk of targeted attacks. The requirement for local access limits remote exploitation but does not eliminate risk in environments where attackers can gain footholds or trick users into executing malicious files.

Mitigation Recommendations

To mitigate CVE-2026-25866, organizations should immediately upgrade MobaXterm to version 26.1 or later, where the vulnerability is addressed by specifying fully qualified paths when invoking external executables. Until patching is possible, administrators should implement strict file system permissions to prevent unauthorized users from placing executables in directories that appear earlier in the Windows search path. Employ application whitelisting and endpoint detection to monitor for unexpected execution of Notepad++ or similarly named binaries. Additionally, educate users about the risks of executing files from untrusted locations and restrict local user privileges to minimize the impact of potential exploitation. Regularly audit environment variables such as PATH for unsafe or writable directories and remove or secure them. Finally, consider using alternative tools that do not exhibit this vulnerability if immediate patching is not feasible.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulnCheck
Date Reserved
2026-02-06T19:12:03.463Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69aeeccc2904315ca31bf399

Added to database: 3/9/2026, 3:52:44 PM

Last enriched: 3/9/2026, 4:07:01 PM

Last updated: 3/9/2026, 5:55:01 PM

Views: 9

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses