CVE-2026-42214 POC (Proof-of-Concept)

CVE-2026-42214 POC (Proof-of-Concept)

Notepad Next is a cross-platform, reimplementation of Notepad++. Prior to version 0.14, NotepadNext's detectLanguageFromExtension() function interpolates a file's extension directly into a Lua script without sanitization. An attacker can craft a filename whose extension contains Lua code, which executes automatically when the victim opens the file in NotepadNext. Because luaL_openlibs() is called unconditionally, the full os, io, and package libraries are available to the injected code, enabling arbitrary command execution. This issue has been patched in version 0.14.

Published: 2026-05-07

CVSS: 7.8

CVSS Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Download CVE-2026-42214 POC (Proof-of-Concept) here:

Tip: Download official Tor Browser at https://www.torproject.org/download/ to access .onion links.

https://hokyo.gr/poc-298-cve-2026-42237/

https://hokyo.gr/poc-34-cve-2026-31700/

https://hokyo.gr/poc-621-cve-2026-7997/

Copyright 2017- 2025 Hokyo JapanEats ©