Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-34401: CWE-611: Improper Restriction of XML External Entity Reference in microsoft XmlNotepad

0
Medium
VulnerabilityCVE-2026-34401cvecve-2026-34401cwe-611
Published: Tue Mar 31 2026 (03/31/2026, 21:05:50 UTC)
Source: CVE Database V5
Vendor/Project: microsoft
Product: XmlNotepad

Description

CVE-2026-34401 is a medium severity vulnerability in Microsoft XmlNotepad versions prior to 2. 9. 0. 21. The issue arises because DTD processing is enabled by default, allowing XML External Entity (XXE) attacks. An attacker can craft malicious XML files that cause XmlNotepad to make outbound HTTP or SMB requests, potentially leaking local file contents or NTLM credentials. Exploitation requires user interaction to open a malicious XML file. The vulnerability impacts confidentiality but not integrity or availability. Microsoft patched this issue in version 2. 9.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/31/2026, 21:38:52 UTC

Technical Analysis

CVE-2026-34401 is an XML External Entity (XXE) vulnerability classified under CWE-611 affecting Microsoft XmlNotepad versions before 2.9.0.21. XmlNotepad is a Windows application designed for browsing and editing XML documents. The vulnerability stems from the application’s default behavior of enabling Document Type Definition (DTD) processing, which allows external entities within XML files to be resolved automatically. An attacker can exploit this by crafting a malicious XML file containing a DTD that triggers XmlNotepad to perform outbound HTTP or SMB requests. These requests can be manipulated to exfiltrate local file contents or capture the victim’s NTLM authentication credentials through network-based attacks. The vulnerability requires the victim to open a malicious XML file, thus involving user interaction. The attack does not require prior authentication and can be executed remotely if the victim opens the crafted file. Microsoft addressed this vulnerability by disabling DTD processing by default starting with XmlNotepad version 2.9.0.21, effectively mitigating the risk. The CVSS v3.1 base score is 6.5, reflecting a medium severity level due to the high confidentiality impact but no impact on integrity or availability. No known exploits have been reported in the wild, but the vulnerability remains a concern for users of unpatched versions.

Potential Impact

The primary impact of CVE-2026-34401 is the potential compromise of confidentiality. Attackers can leverage the XXE vulnerability to exfiltrate sensitive local files from the victim’s system or capture NTLM credentials, which can be used for lateral movement or further network compromise. This can lead to unauthorized access to internal resources and sensitive data breaches. Since the vulnerability requires user interaction (opening a malicious XML file), the attack vector is somewhat limited but remains significant in environments where users frequently handle XML files from untrusted sources. The integrity and availability of the system are not affected directly by this vulnerability. Organizations that use XmlNotepad for XML editing, especially in sectors handling sensitive data such as government, finance, healthcare, and critical infrastructure, face increased risk if unpatched. The ability to capture NTLM credentials also raises concerns about broader network security, as these credentials can facilitate further attacks within Windows environments.

Mitigation Recommendations

To mitigate CVE-2026-34401, organizations should immediately upgrade Microsoft XmlNotepad to version 2.9.0.21 or later, where DTD processing is disabled by default. Until the upgrade is deployed, users should be educated to avoid opening XML files from untrusted or unknown sources. Implement network-level controls to monitor and restrict outbound SMB and HTTP requests originating from client machines, which can help detect or block exploitation attempts. Employ endpoint detection and response (EDR) solutions to identify suspicious behaviors related to XML processing and credential theft. Additionally, consider disabling NTLM authentication where feasible or enforce NTLM hardening policies to reduce credential theft risks. Regularly audit and monitor logs for unusual outbound network activity or authentication attempts. Finally, incorporate this vulnerability into organizational threat modeling and incident response plans to ensure rapid detection and remediation if exploitation is suspected.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-27T13:45:29.620Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69cc3b45e6bfc5ba1d430c9d

Added to database: 3/31/2026, 9:23:17 PM

Last enriched: 3/31/2026, 9:38:52 PM

Last updated: 3/31/2026, 10:30:48 PM

Views: 2

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses