A critical privilege escalation vulnerability (CVE-2025-49144) in Notepad++ v8.8.1 enables attackers to achieve full system control through a supply-chain attack.
The flaw exploits the installer’s insecure search path behavior, allowing unprivileged users to escalate privileges to NT AUTHORITY\SYSTEM with minimal user interaction.
This marks one of the most severe vulnerabilities discovered in the popular text editor, with proof-of-concept (PoC) exploitation materials now publicly available.
The vulnerability stems from uncontrolled EXE/DLL search paths in the Notepad++ installer. During installation, the software insecurely searches for executable dependencies (like regsvr32.exe) in the current working directory without verification.
Attackers can place malicious executables in directories where users typically download files (e.g., Downloads), causing the installer to execute them with SYSTEM privileges. Key aspects include:
| Aspect | Detail |
| Vulnerability Type | Binary Planting/Uncontrolled Search Path |
| Affected Versions | Notepad++ v8.8.1 (Released May 5, 2025) |
| Patched Version | v8.8.2 |
| CVSS v3.1 Score | 7.3 (High) |
Exploitation and Impact
Successful exploitation follows a three-step process:
Documented PoC materials, including video evidence and reverse-shell demonstrations, confirm attackers can:

Historical Context
This flaw echoes past Notepad++ vulnerabilities:
Mitigation and Recommendations
Notepad++ released v8.8.2 to address the flaw by:
# Verify installer integrity via SHA-256 checksum
certutil -hashfile npp.8.8.2.Installer.x64.exe SHA256
CVE-2025-49144 exemplifies how seemingly minor installer oversights can enable devastating privilege escalation.
With PoC exploits circulating, organizations and individual users must prioritize patching to prevent system-wide compromises.
Notepad++’s prompt patch underscores the importance of coordinated disclosure, though users should remain vigilant against similar supply-chain threats.