PoC for a remote code execution flaw in Windows Notepad's markdown renderer. The markdown engine does not restrict URL protocols, allowing arbitrary protocol handlers to be triggered via clickable links.
- Not my discovery. Credit goes to the original researchers on the MSRC advisory. This is a PoC recreation.
- Lower severity than it sounds. Requires more than one click in most cases (see Limitations).
[click](file://C:/windows/system32/cmd.exe)Launches any executable already on disk — cmd.exe, powershell.exe, mshta.exe, etc.
- Vulnerable Notepad builds are on Uptodown. Verify the digital signature before use.
- Test only in a VM.
Stay safe!

