Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-4546: Uncontrolled Search Path in Flos Freeware Notepad2

0
High
VulnerabilityCVE-2026-4546cvecve-2026-4546
Published: Sun Mar 22 2026 (03/22/2026, 13:02:40 UTC)
Source: CVE Database V5
Vendor/Project: Flos Freeware
Product: Notepad2

Description

CVE-2026-4546 is a high-severity vulnerability in Flos Freeware Notepad2 version 4. 2. 25 involving an uncontrolled search path in the TextShaping. dll library. This flaw allows a local attacker with limited privileges to manipulate the search path used by the application, potentially leading to the loading of malicious code. Exploitation is complex and requires local access, with no user interaction needed. The vulnerability impacts confidentiality, integrity, and availability due to high impact on these security properties. No patches or vendor responses are currently available, and no known exploits exist in the wild. Organizations using this specific version of Notepad2 should prioritize mitigation to prevent local privilege escalation or code execution risks.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/29/2026, 20:04:22 UTC

Technical Analysis

CVE-2026-4546 identifies a vulnerability in Flos Freeware Notepad2 version 4.2.25, specifically within an unknown function of the TextShaping.dll library. The issue is an uncontrolled search path weakness, meaning the application does not securely handle the directories it searches when loading dependent libraries or modules. This can allow an attacker with local access to place a malicious DLL or file in a location that the application will load instead of the legitimate one, leading to potential arbitrary code execution or privilege escalation. The attack complexity is high, requiring detailed knowledge of the environment and local access with limited privileges. The vulnerability does not require user interaction and has a high impact on confidentiality, integrity, and availability, as malicious code could compromise system security. The vendor was contacted but has not responded or issued a patch, and no public exploits have been observed. The CVSS v4.0 score is 7.3, reflecting the significant risk posed by this vulnerability despite the difficulty in exploitation. The flaw is confined to version 4.2.25 of Notepad2, a popular lightweight text editor, often used in Windows environments.

Potential Impact

The vulnerability could allow a local attacker to execute arbitrary code with the privileges of the user running Notepad2, potentially leading to unauthorized access to sensitive information, modification or corruption of data, and disruption of application or system availability. Since Notepad2 is commonly used in Windows environments, exploitation could facilitate lateral movement or privilege escalation within an organization’s network. The high complexity and local access requirement limit widespread exploitation but do not eliminate risk in environments where multiple users share systems or where attackers have gained initial footholds. The absence of vendor response and patches increases the window of exposure. Organizations relying on this version of Notepad2 face risks of compromise, especially in sensitive or multi-user environments.

Mitigation Recommendations

Organizations should immediately audit their environments for the presence of Notepad2 version 4.2.25 and restrict its use where possible. Until a vendor patch is available, mitigation should focus on minimizing local attack surface: enforce strict access controls to prevent unauthorized local access, implement application whitelisting to block unauthorized DLLs or executables, and monitor file system changes in directories used by Notepad2 for loading libraries. Running Notepad2 with the least privilege necessary reduces impact. Consider replacing Notepad2 with alternative text editors that do not have this vulnerability. Additionally, employ endpoint detection and response (EDR) solutions to detect suspicious DLL loading or process behavior. Regularly check for vendor updates or community patches addressing this issue.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-03-21T16:44:04.131Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69bfef0bf4197a8e3b75ae78

Added to database: 3/22/2026, 1:30:51 PM

Last enriched: 3/29/2026, 8:04:22 PM

Last updated: 5/7/2026, 4:58:49 AM

Views: 94

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses