Notepad++ is a free and open-source source code editor. In versions 8.8.1 and prior, a privilege escalation vulnerability exists in the Notepad++ v8.8.1 installer that allows unprivileged users to gain SYSTEM-level privileges through insecure executable search paths. An attacker could use social engineering or clickjacking to trick users into downloading both the legitimate installer and a malicious executable to the same directory (typically Downloads folder - which is known as Vulnerable directory). Upon running the installer, the attack executes automatically with SYSTEM privileges. This issue has been fixed and will be released in version 8.8.2.
{
"cna_assigner": "GitHub_M",
"cwe_ids": [
"CWE-272",
"CWE-276",
"CWE-427"
],
"osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/49xxx/CVE-2025-49144.json"
}[
{
"signature_type": "Line",
"deprecated": false,
"id": "CVE-2025-49144-39c82b77",
"target": {
"file": "PowerEditor/src/WinControls/AboutDlg/AboutDlg.cpp"
},
"digest": {
"threshold": 0.9,
"line_hashes": [
"73934179812655448165055737310699482624",
"85968448963209917242124120043006684639",
"172862223200600562710544336807765320670",
"301609101041233027849684726318785423858",
"174719166322487855964376375868070734674",
"247875542339173634363367183650461108957",
"99522975011803531364419316283400406538",
"221630942636909589364283828809168556562",
"144088549690105996214811181265758078282"
]
},
"signature_version": "v1",
"source": "https://github.com/notepad-plus-plus/notepad-plus-plus/commit/cc45875c60bbfdd10a9751f33b3f18fe8bb826a7"
},
{
"signature_type": "Function",
"deprecated": false,
"id": "CVE-2025-49144-7616ebe8",
"target": {
"file": "PowerEditor/src/WinControls/AboutDlg/AboutDlg.cpp",
"function": "AboutDlg::run_dlgProc"
},
"digest": {
"length": 2275.0,
"function_hash": "79135054854521377136545161067915968907"
},
"signature_version": "v1",
"source": "https://github.com/notepad-plus-plus/notepad-plus-plus/commit/cc45875c60bbfdd10a9751f33b3f18fe8bb826a7"
}
]
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-49144.json"