Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-25866: CWE-428 Unquoted search path or element in Mobatek MobaXterm

0
High
VulnerabilityCVE-2026-25866cvecve-2026-25866cwe-428
Published: Mon Mar 09 2026 (03/09/2026, 15:24:47 UTC)
Source: CVE Database V5
Vendor/Project: Mobatek
Product: MobaXterm

Description

MobaXterm versions prior to 26.1 contain an uncontrolled search path element vulnerability. The application calls WinExec to execute Notepad++ without a fully qualified executable path when opening remote files. An attacker can exploit the search path behavior by placing a malicious executable earlier in the search order, resulting in arbitrary code execution in the context of the affected user.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/16/2026, 19:02:01 UTC

Technical Analysis

CVE-2026-25866 is a vulnerability classified under CWE-428 (Unquoted Search Path or Element) affecting MobaXterm versions prior to 26.1. The root cause is that MobaXterm invokes Notepad++ using the WinExec API without specifying the full executable path, relying instead on the Windows search path to locate Notepad++. This behavior can be exploited by an attacker who can place a malicious executable named similarly to Notepad++ in a directory that appears earlier in the search order than the legitimate executable. When MobaXterm attempts to open remote files with Notepad++, the malicious executable is run instead, resulting in arbitrary code execution under the context of the logged-in user. The vulnerability requires the attacker to have local or network access to place the malicious executable in a suitable directory, but it does not require user interaction or elevated privileges beyond those of the user. The CVSS 4.0 score of 8.5 reflects its high severity, considering the ease of exploitation with low complexity, no user interaction, and the potential for full compromise of the user's session. No patches are currently linked, indicating that users must rely on workarounds or wait for an official update. The vulnerability affects confidentiality, integrity, and availability since arbitrary code execution can lead to data theft, system manipulation, or denial of service.

Potential Impact

The primary impact of CVE-2026-25866 is the potential for arbitrary code execution within the security context of the affected user. This can lead to unauthorized access to sensitive data, modification or destruction of files, and disruption of normal operations. For organizations, exploitation could result in compromised endpoints, lateral movement within networks, and potential data breaches. Since MobaXterm is widely used by IT professionals for remote administration and file editing, attackers could leverage this vulnerability to implant persistent backdoors or malware. The vulnerability's exploitation does not require elevated privileges, increasing the risk for standard users. The lack of user interaction requirement further lowers the barrier for successful attacks. Although no known exploits are reported in the wild yet, the high CVSS score and the nature of the vulnerability suggest it could become a target for attackers soon. Organizations relying on MobaXterm in critical environments face risks to operational continuity and data security.

Mitigation Recommendations

To mitigate CVE-2026-25866, organizations should immediately upgrade MobaXterm to version 26.1 or later once available. Until a patch is released, users should avoid opening remote files with Notepad++ through MobaXterm or configure MobaXterm to use fully qualified paths for executables if possible. Restrict write permissions on directories included in the Windows search path to prevent attackers from placing malicious executables. Employ application whitelisting to block unauthorized executables from running. Monitor systems for unusual process executions related to Notepad++ or MobaXterm. Educate users about the risks of running untrusted executables and enforce the principle of least privilege to limit the impact of potential exploitation. Network segmentation and endpoint detection and response (EDR) solutions can help detect and contain exploitation attempts. Regularly audit and harden environment variables such as PATH to reduce exposure to untrusted directories.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulnCheck
Date Reserved
2026-02-06T19:12:03.463Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69aeeccc2904315ca31bf399

Added to database: 3/9/2026, 3:52:44 PM

Last enriched: 3/16/2026, 7:02:01 PM

Last updated: 4/23/2026, 10:53:42 PM

Views: 641

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses