Privilege Escalation in Notepad++ Installer Affects Multiple Users
CVE-2025-49144

7.3HIGH

Key Information:

Vendor
CVE Published:
23 June 2025

Badges

๐Ÿฅ‡ Trended No. 1๐Ÿ“ˆ Trended๐Ÿ“ˆ Score: 11,100๐Ÿ‘พ Exploit Exists๐ŸŸก Public PoC๐Ÿ“ฐ News Worthy

What is CVE-2025-49144?

CVE-2025-49144 is a privilege escalation vulnerability found in the Notepad++ installer, particularly affecting versions 8.8.1 and earlier. Notepad++ is a widely used free and open-source source code editor that is popular among developers for its versatility and lightweight design. The vulnerability allows unprivileged users to gain SYSTEM-level privileges due to insecure executable search paths during the installation process. Attackers can exploit this flaw by leveraging social engineering techniques or clickjacking to convince users to download a legitimate Notepad++ installer alongside a malicious executable in the same directory, such as the typical Downloads folder. When users run the installer, the malicious executable can execute with elevated privileges, potentially compromising system integrity and security.

Potential Impact of CVE-2025-49144

  1. Unauthorized System Access: The privilege escalation capability of this vulnerability enables attackers to gain unauthorized SYSTEM-level access. This can lead to a range of malicious activities, including installation of additional malware, data exfiltration, and complete system control.

  2. Data Breaches and Compromise: Successful exploitation may expose sensitive data stored on the system, leading to data breaches. Organizations could face loss of confidential information, which can have financial impacts and damage reputations.

  3. Increased Attack Surface: The vulnerability could serve as a gateway for further attacks, allowing malicious actors to move laterally within the network. This not only jeopardizes individual systems but can also threaten the security of interconnected systems and services, increasing the overall risk to the organization.

Affected Version(s)

notepad-plus-plus < 8.8.2

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

News Articles

High-Severity Vulnerability in Notepad++

Notepad++ has released security updates addressing a vulnerability affecting their product. Users and administrators of affected products are advised to...

2 weeks ago

High-Severity Vulnerability in Notepad++

Notepad++ has released security updates addressing a vulnerability affecting their product. Users and administrators of affected products are advised to...

2 weeks ago

Week in review: Backdoor found in SOHO devices running Linux, high-risk WinRAR RCE flaw patched - Help Net Security

Hereโ€™s an overview of some of last weekโ€™s most interesting news, articles, interviews and videos: Stealthy backdoor found hiding in SOHO devices running

2 weeks ago

References

CVSS V3.1

Score:
7.3
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
Required
Scope:
Unchanged

Timeline

  • ๐Ÿฅ‡

    Vulnerability reached the number 1 worldwide trending spot

  • ๐ŸŸก

    Public PoC available

  • ๐Ÿ“ˆ

    Vulnerability started trending

  • ๐Ÿ‘พ

    Exploit known to exist

  • ๐Ÿ“ฐ

    First article discovered by Red Hot Cyber

  • Vulnerability published

  • Vulnerability Reserved

.
CVE-2025-49144 : Privilege Escalation in Notepad++ Installer Affects Multiple Users