Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Tue, 12 May 2026 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Dail8859 notepad Next
|
|
| CPEs | cpe:2.3:a:dail8859:notepad_next:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Dail8859 notepad Next
|
Thu, 07 May 2026 21:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Dail8859
Dail8859 notepadnext |
|
| Vendors & Products |
Dail8859
Dail8859 notepadnext |
Thu, 07 May 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 07 May 2026 19:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Notepad Next is a cross-platform, reimplementation of Notepad++. Prior to version 0.14, NotepadNext's detectLanguageFromExtension() function interpolates a file's extension directly into a Lua script without sanitization. An attacker can craft a filename whose extension contains Lua code, which executes automatically when the victim opens the file in NotepadNext. Because luaL_openlibs() is called unconditionally, the full os, io, and package libraries are available to the injected code, enabling arbitrary command execution. This issue has been patched in version 0.14. | |
| Title | Improper Control of Generation of Code ('Code Injection') in dail8859/NotepadNext | |
| Weaknesses | CWE-94 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-05-09T03:55:59.742Z
Reserved: 2026-04-25T05:04:37.028Z
Link: CVE-2026-42214
Updated: 2026-05-07T19:00:53.424Z
Status : Analyzed
Published: 2026-05-07T19:16:01.497
Modified: 2026-05-12T20:24:32.747
Link: CVE-2026-42214
No data.
OpenCVE Enrichment
Updated: 2026-05-07T21:30:25Z