Notepad's new Markdown powers served with a side of RCE
The vulnerability allows remote code execution via malicious Markdown links in Notepad, fixed in February 2026 updates; no exploitation in the wild has been reported by Microsoft.
- On Tuesday, Microsoft issued the patch that fixed a high-severity Notepad remote code execution flaw tracked as CVE-2026-20841, disclosed in Patch Tuesday updates.
- Notepad's recently added Markdown support and AI-powered writing features modernized Windows 11 Notepad, but critics raised concerns about expanding the app's attack surface.
- Clickable links in Markdown files can trigger unverified protocols such as file: or ms-appinstaller:, executing programs without warnings in the security context of end users who click links.
- Microsoft says there is no evidence attackers exploited the Notepad vulnerability in the wild, and tests show Windows 11 Notepad now warns when clicking non-http links.
- Separately, the ecosystem shows related risks as Notepad++ disclosed that it warned of a malicious update linked to Chinese state-sponsored attackers.
19 Articles
19 Articles
Microsoft fixes Notepad flaw that could trick users into clicking malicious Markdown links
Microsoft has fixed a serious security vulnerability affecting Markdown files in Notepad. In the company's Tuesday patch notes, Microsoft says a bad actor could carry out a remote code execution attack by tricking users "into clicking a malicious link inside a Markdown file opened in Notepad," as reported earlier by The Register. Clicking the link would "launch unverified protocols," allowing attackers to remotely load and execute malicious file…
Unwanted AI upgrade to Windows Notepad created a serious security flaw
According to Microsoft's release notes, the update fixes 25 elevation of privilege flaws, 12 remote code execution vulnerabilities, three denial of service vulnerabilities, five security feature bypass exploits, six information disclosure bugs, and seven spoofing vulnerabilities. Six of the vulnerabilities were rated "Critical," while the rest were marked as "Severe."Read Entire Article
Coverage Details
Bias Distribution
- 67% of the sources are Center
Factuality
To view factuality data please Upgrade to Premium











