CVE-2026-25866

7.8 HIGH

📋 TL;DR

MobaXterm versions before 26.1 contain a path search order vulnerability where the application executes Notepad++ without specifying the full executable path. This allows attackers to place malicious executables in directories searched before the legitimate Notepad++ installation, leading to arbitrary code execution as the current user. All users running vulnerable MobaXterm versions on Windows are affected.

💻 Affected Systems

Products:
  • MobaXterm
Versions: All versions prior to 26.1
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability triggers when opening remote files that invoke Notepad++ execution.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise via arbitrary code execution with user privileges, potentially leading to privilege escalation, data theft, or ransomware deployment.

🟠

Likely Case

Local attacker gains code execution in user context, enabling credential theft, lateral movement, or persistence establishment.

🟢

If Mitigated

Limited impact with proper application whitelisting, restricted user permissions, and controlled directory permissions.

🌐 Internet-Facing: LOW
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires local access or ability to place files in search path directories.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 26.1 and later

Vendor Advisory: https://mobaxterm.mobatek.net/download-home-edition.html

Restart Required: Yes

Instructions:

1. Download MobaXterm version 26.1 or newer from official website. 2. Install over existing version. 3. Restart system or at least MobaXterm application.

🔧 Temporary Workarounds

Restrict write permissions to search path directories

windows

Prevent attackers from placing malicious executables in directories searched before Notepad++ installation.

icacls "C:\Windows" /deny Everyone:(OI)(CI)W
icacls "C:\Windows\System32" /deny Everyone:(OI)(CI)W
icacls "%USERPROFILE%" /deny Everyone:(OI)(CI)W

Create Notepad++ placeholder executable

windows

Place a legitimate notepad++.exe in a directory that appears earlier in search order than attacker-controlled locations.

copy "C:\Program Files\Notepad++\notepad++.exe" "C:\Windows\notepad++.exe"

🧯 If You Can't Patch

  • Implement application control/whitelisting to prevent execution of unauthorized binaries.
  • Use least privilege accounts and restrict write access to system and user directories.

🔍 How to Verify

Check if Vulnerable:

Check MobaXterm version in Help > About. If version is below 26.1, system is vulnerable.

Check Version:

wmic product where "name like 'MobaXterm%'" get version

Verify Fix Applied:

Confirm MobaXterm version is 26.1 or higher in Help > About dialog.

📡 Detection & Monitoring

Log Indicators:

  • Process creation events for notepad++.exe from unexpected locations
  • MobaXterm spawning unexpected child processes

Network Indicators:

  • Unusual outbound connections following MobaXterm execution

SIEM Query:

Process Creation: (ImagePath contains "notepad++.exe" AND ParentImage contains "MobaXterm")

🔗 References

📤 Share & Export