12 de febrero de 2026

Windows 11 Notepad Bug Let Markdown Links Run Files Without Warning

Microsoft has patched a high-severity security vulnerability in Windows 11 Notepad that allowed specially crafted Markdown links to launch local or remote programs - without triggering standard Windows security warnings.

The flaw tracked as CVE-2026-20841 was fixed as part of the February 2026 Patch Tuesday updates, which we release monthly.

While exploitation required a user to open a malicious Markdown file and click a link, the lack of any warning prompt made the issue especially dangerous.

What Went Wrong?

Notepad has evolved significantly since its debut in Windows 1.0. With Windows 11, Microsoft modernized the app by:

  • Adding Markdown support
  • Enabling richer formatting features
  • Retiring WordPad as the default RTF editor

Markdown support allows users to create formatted text and clickable links using simple syntax, such as:

  • **Bold text**
  • [Example Link](https://example.com)

However, researchers discovered that Notepad did not properly restrict non-standard protocols inside Markdown links.

How the Exploit Worked

In vulnerable versions (11.2510 and earlier):

  • Links using protocols like file://, ms-appinstaller://, and other custom URI schemes
  • Became clickable in Markdown view
  • Launched executables directly when Ctrl+clicked
  • Displayed no Windows security warning

This meant an attacker could:

  1. Create a malicious Markdown (.md) file
  2. Insert a link pointing to a local or remote executable
  3. Trick a user into clicking it

If clicked, the program would run with the same permissions as the logged-in user.

In some cases, the link could point to a file hosted on a remote SMB share, expanding the potential attack surface.

What Microsoft Changed

Microsoft has now implemented stricter safeguards.

Notepad will:

  • Display a warning dialog for any link that does not use standard http:// or https:// protocols
  • Require explicit user confirmation before proceeding

This eliminates the previous silent execution behavior.

While social engineering remains possible (users could still click “Yes”), the automatic launch without warning is no longer an issue.

Why This Matters

This vulnerability highlights an important lesson:

"Even simple apps can introduce serious security risks when new features are added."

Markdown support made Notepad more powerful and flexible - but it also expanded the application’s attack surface.

Update Status

Because Notepad updates automatically through the Microsoft Store, most Windows 11 users should receive the fix without manual action.

Still, keeping Windows fully updated remains essential, especially when vulnerabilities involve remote code action.

Thank you for being a Ghacks reader. The post Windows 11 Notepad Bug Let Markdown Links Run Files Without Warning appeared first on gHacks.



☞ El artículo completo original de Arthur Kay lo puedes ver aquí

No hay comentarios.:

Publicar un comentario