We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-49144

Notepad++ Privilege Escalation in Installer via Uncontrolled Executable Search Path



Description

Notepad++ is a free and open-source source code editor. In versions 8.8.1 and prior, a privilege escalation vulnerability exists in the Notepad++ v8.8.1 installer that allows unprivileged users to gain SYSTEM-level privileges through insecure executable search paths. An attacker could use social engineering or clickjacking to trick users into downloading both the legitimate installer and a malicious executable to the same directory (typically Downloads folder - which is known as Vulnerable directory). Upon running the installer, the attack executes automatically with SYSTEM privileges. This issue has been fixed and will be released in version 8.8.2.

Reserved 2025-06-02 | Published 2025-06-23 | Updated 2025-07-01 | Assigner GitHub_M


HIGH: 7.3CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H

Problem types

CWE-272: Least Privilege Violation

CWE-276: Incorrect Default Permissions

CWE-427: Uncontrolled Search Path Element

Product status

< 8.8.2
affected

References

github.com/...s-plus/security/advisories/GHSA-9vx8-v79m-6m24

github.com/...ommit/f2346ea00d5b4d907ed39d8726b38d77c8198f30

drive.google.com/...olders/11yeUSWgqHvt4Bz5jO3ilRRfcpQZ6Gvpn

cve.org (CVE-2025-49144)

nvd.nist.gov (CVE-2025-49144)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-49144

Support options

Helpdesk Chat, Email, Knowledgebase