Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Wed, 06 May 2026 14:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:mobatek:mobaxterm:*:*:*:*:home:*:*:* |
Wed, 11 Mar 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:mobatek:mobaxterm:*:*:*:*:*:*:*:* |
Tue, 10 Mar 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Mobatek
Mobatek mobaxterm |
|
| Vendors & Products |
Mobatek
Mobatek mobaxterm |
Mon, 09 Mar 2026 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 09 Mar 2026 15:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | MobaXterm versions prior to 26.1 contain an uncontrolled search path element vulnerability. The application calls WinExec to execute Notepad++ without a fully qualified executable path when opening remote files. An attacker can exploit the search path behavior by placing a malicious executable earlier in the search order, resulting in arbitrary code execution in the context of the affected user. | |
| Title | MobaXterm < 26.1 Notepad++ Unquoted Service Path | |
| Weaknesses | CWE-428 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-03-11T13:57:44.185Z
Reserved: 2026-02-06T19:12:03.463Z
Link: CVE-2026-25866
Updated: 2026-03-09T17:23:43.394Z
Status : Analyzed
Published: 2026-03-09T16:16:18.970
Modified: 2026-05-06T14:23:35.850
Link: CVE-2026-25866
No data.
OpenCVE Enrichment
Updated: 2026-04-16T04:00:09Z