CVE-2026-23512

8.6 HIGH

📋 TL;DR

SumatraPDF versions 3.5.2 and earlier contain an untrusted search path vulnerability that allows arbitrary code execution. When users trigger the Advanced Options setting, the application executes notepad.exe without specifying an absolute path, enabling attackers to place a malicious notepad.exe in the installation directory. This affects all Windows users running vulnerable versions of SumatraPDF.

💻 Affected Systems

Products:
  • SumatraPDF
Versions: 3.5.2 and earlier
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects Windows systems. Vulnerability is present in default configuration when Advanced Options feature is used.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with attacker gaining the same privileges as the user running SumatraPDF, potentially leading to data theft, ransomware deployment, or persistent backdoor installation.

🟠

Likely Case

Local privilege escalation where an attacker with write access to the installation directory can execute arbitrary code when a user opens Advanced Options, potentially stealing documents or credentials.

🟢

If Mitigated

Limited impact with proper file permissions preventing unauthorized writes to the installation directory and user awareness preventing execution of suspicious files.

🌐 Internet-Facing: LOW - This requires local access to the system or successful social engineering to place malicious files, not directly exploitable over the network.
🏢 Internal Only: MEDIUM - In enterprise environments, attackers with initial access could exploit this for lateral movement or privilege escalation within the network.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires write access to SumatraPDF installation directory and user interaction to trigger Advanced Options. No public exploit code has been published.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 3.5.3 and later

Vendor Advisory: https://github.com/sumatrapdfreader/sumatrapdf/security/advisories/GHSA-rqg5-gj63-x4mv

Restart Required: No

Instructions:

1. Download latest version from official SumatraPDF website
2. Uninstall current version
3. Install new version
4. Verify version is 3.5.3 or higher

🔧 Temporary Workarounds

Restrict installation directory permissions

windows

Set file permissions on SumatraPDF installation directory to prevent unauthorized writes

icacls "C:\Program Files\SumatraPDF" /deny Users:(OI)(CI)W

Disable Advanced Options feature

windows

Remove or restrict access to Advanced Options setting through group policy or configuration

🧯 If You Can't Patch

  • Restrict write permissions on SumatraPDF installation directory to administrators only
  • Monitor for suspicious file creation in SumatraPDF directory and block execution of notepad.exe from that location

🔍 How to Verify

Check if Vulnerable:

Check SumatraPDF version in Help > About menu. If version is 3.5.2 or earlier, system is vulnerable.

Check Version:

SumatraPDF.exe --version or check Help > About in the application

Verify Fix Applied:

After updating, verify version is 3.5.3 or higher in Help > About menu. Test Advanced Options functionality to ensure it still works properly.

📡 Detection & Monitoring

Log Indicators:

  • Process creation events for notepad.exe from SumatraPDF directory
  • File creation events for notepad.exe in SumatraPDF installation path

Network Indicators:

  • Unusual outbound connections following notepad.exe execution from SumatraPDF directory

SIEM Query:

ProcessName="notepad.exe" AND ProcessPath contains "SumatraPDF" AND ParentProcessName="SumatraPDF.exe"

🔗 References

📤 Share & Export