Windows 11 Notepad Vulnerability Allowed Malicious Code to Run via Markdown Links


Windows Notepad RCE Vulnerability

Microsoft has patched a serious security flaw in the Windows 11 Notepad app that could let attackers run harmful code simply by convincing a user to click a link inside a Markdown file. The company resolved this issue in its February 2026 Patch Tuesday update.

The vulnerability, tracked as CVE-2026-20841, was rated with a high severity score of 8.8. It affected the modern Notepad app distributed through the Microsoft Store. The flaw could allow attackers to execute local or remote programs without triggering normal Windows security warnings.

What Was the Problem?

Traditional Notepad was once a simple program for editing plain text. Recently, Microsoft added Markdown support to Notepad so users could view formatted text and clickable hyperlinks. Unfortunately, this change widened the app’s attack surface.

In affected versions of Notepad, a malicious Markdown file could contain crafted links using non-standard protocols (for example file: or other custom schemes). If a user opened that file in Notepad and clicked the link, Notepad could launch the target program without warning.

A remote attacker would need to deliver the file to a user (for example via email or download). The exploit depended on user interaction – clicking the link – but could still lead to remote code execution running with the same privileges as the logged-in user.

AspectDetails
Vulnerability IDCVE-2026-20841
Severity Score8.8 (high)
Affected SoftwareWindows 11 Notepad app (Microsoft Store)
Introduced FeatureMarkdown rendering and clickable links
Exploitation MethodUser opens crafted Markdown file and clicks malicious link
ImpactRemote code execution with user-level permissions
Fix StatusPatched in February 2026 update
Known ExploitationNo active exploitation reported

So why is this issue rated as “8.8”? Well there are multiple reasons:

  • Wide Reach: Notepad is installed by default on virtually all Windows 11 devices, so the number of potentially affected systems was very large.
  • Simple Trick: The vulnerability did not require advanced malware — just a manipulated Markdown file and a click.
  • Trust Assumption: Many Windows users trust Notepad as a basic offline tool, so unexpected behaviour from it raised security concerns.

How Microsoft Fixed Notepad RCE bug on Windows 11

Microsoft issued a patch through its February 10, 2026 Patch Tuesday security update. This update updated Notepad to a fixed version available via the Microsoft Store.

After the fix:

  • Notepad now warns users if they click links that do not use standard web protocols (http:// or https://).
  • The application blocks direct execution of unverified protocols without clear user acknowledgment.

Users must ensure the Microsoft Store Notepad app is updated to a patched build. Automatic app updates in Windows Settings should be enabled to receive fixes promptly.

How to Protect Yourself

Update First

  • Open Microsoft Store → Updates → update Notepad.
  • Enable automatic updates in Windows Settings.

Avoid Untrusted Files

  • Do not open .md files from unknown sources.
  • Do not click any link inside a Markdown document unless you trust the sender.

Safety Settings

  • Only open Markdown files when necessary.
  • Consider using plain text or trusted text editors that do not render links.

Markdown Links and Security (Quick Notes)

  • Markdown allows links like [text](URL).
  • In Notepad, links could be rendered as clickable elements.
  • Attackers can use unusual protocols (e.g., file:, smb:, etc.) to point to executable code.

Markdown itself is not harmful. The risk came from executable URLs embedded in a trusted environment.

Frequently Asked Questions (FAQ)

Q: Is the classic Notepad.exe affected?

A: No. The legacy Notepad.exe bundled with Windows before the Store version is not impacted by this vulnerability.

Q: Do I need to update Windows to fix this?

A: The patch comes through both Windows Update and Microsoft Store. Confirm Notepad is updated to a remediated version.

Q: Has this vulnerability been exploited in the wild?

A: Microsoft and independent reports indicate no known active exploitation so far.

Q: Can attackers exploit this without user interaction?

A: No. The exploit depended on a user clicking a malicious link in a Markdown file.

Q: Should I disable Markdown in Notepad?

A: Disabling Markdown support reduces exposure. For higher security, open only plain text files or use trusted editors without link rendering.

Readers help support VPNCentral. We may get a commission if you buy through our links. Tooltip Icon

Read our disclosure page to find out how can you help VPNCentral sustain the editorial team Read more

User forum

0 messages