CVE-2026-42214 PUBLISHED

Improper Control of Generation of Code ('Code Injection') in dail8859/NotepadNext

Assigner: GitHub_M
Reserved: 25.04.2026 Published: 07.05.2026 Updated: 07.05.2026

Notepad Next is a cross-platform, reimplementation of Notepad++. Prior to version 0.14, NotepadNext's detectLanguageFromExtension() function interpolates a file's extension directly into a Lua script without sanitization. An attacker can craft a filename whose extension contains Lua code, which executes automatically when the victim opens the file in NotepadNext. Because luaL_openlibs() is called unconditionally, the full os, io, and package libraries are available to the injected code, enabling arbitrary command execution. This issue has been patched in version 0.14.

Metrics

CVSS Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVSS Score: 7.8

Product Status

Vendor dail8859
Product NotepadNext
Versions
  • Version < 0.14 is affected

References

Problem Types

  • CWE-94: Improper Control of Generation of Code ('Code Injection') CWE