CVE-2026-25880: CWE-426: Untrusted Search Path in sumatrapdfreader sumatrapdf
SumatraPDF is a multi-format reader for Windows. In 3.5.2 and earlier, the PDF reader allows execution of a malicious binary (explorer.exe) located in the same directory as the opened PDF when the user clicks File → “Show in folder”. This behavior leads to arbitrary code execution on the victim’s system with the privileges of the current user, without any warning or user interaction beyond the menu click.
CVE-2026-25880: CWE-426: Untrusted Search Path in sumatrapdfreader sumatrapdf
Description
SumatraPDF is a multi-format reader for Windows. In 3.5.2 and earlier, the PDF reader allows execution of a malicious binary (explorer.exe) located in the same directory as the opened PDF when the user clicks File → “Show in folder”. This behavior leads to arbitrary code execution on the victim’s system with the privileges of the current user, without any warning or user interaction beyond the menu click.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-02-06T21:08:39.129Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 698a52254b57a58fa172845f
Added to database: 2/9/2026, 9:31:17 PM
Last updated: 2/9/2026, 9:31:34 PM
Views: 1
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-25885: CWE-285: Improper Authorization in polarnl PolarLearn
CriticalCVE-2026-25881: CWE-1321: Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') in nyariv SandboxJS
CriticalCVE-2026-25875: CWE-863: Incorrect Authorization in Praskla-Technology assessment-placipy
CriticalCVE-2026-25814: CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') in Praskla-Technology assessment-placipy
CriticalCVE-2026-25813: CWE-532: Insertion of Sensitive Information into Log File in Praskla-Technology assessment-placipy
HighActions
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.