Home

Description

Notepad++ is a free and open-source source code editor. In versions 8.8.1 and prior, a privilege escalation vulnerability exists in the Notepad++ v8.8.1 installer that allows unprivileged users to gain SYSTEM-level privileges through insecure executable search paths. An attacker could use social engineering or clickjacking to trick users into downloading both the legitimate installer and a malicious executable to the same directory (typically Downloads folder - which is known as Vulnerable directory). Upon running the installer, the attack executes automatically with SYSTEM privileges. This issue has been fixed and will be released in version 8.8.2.

PUBLISHED Reserved 2025-06-02 | Published 2025-06-23 | Updated 2025-10-23 | Assigner GitHub_M




HIGH: 7.3CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H

Problem types

CWE-272: Least Privilege Violation

CWE-276: Incorrect Default Permissions

CWE-427: Uncontrolled Search Path Element

Product status

< 8.8.2
affected

References

www.vicarius.io/...e-2025-49144-detect-notepad-vulnerability

www.vicarius.io/...2025-49144-mitigate-notepad-vulnerability

github.com/...s-plus/security/advisories/GHSA-9vx8-v79m-6m24

github.com/...ommit/f2346ea00d5b4d907ed39d8726b38d77c8198f30

drive.google.com/...olders/11yeUSWgqHvt4Bz5jO3ilRRfcpQZ6Gvpn

cve.org (CVE-2025-49144)

nvd.nist.gov (CVE-2025-49144)

Download JSON

Data based on CVE®. Copyright © 1999-2025, The MITRE Corporation. All rights reserved.