PT-2026-5735 · Notepad++ · Notepad++
Published
2025-12-09
·
Updated
2026-02-18
·
CVE-2025-15556
CVSS v4.0
7.7
7.7
High
| Base vector | Vector | AV:N/AC:H/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N |
Name of the Vulnerable Software and Affected Versions
Notepad++ versions prior to 8.8.9
Description
The WinGUp updater in Notepad++ versions prior to 8.8.9 has a flaw in how it verifies the integrity of updates. Specifically, downloaded update metadata and installers are not cryptographically verified. This allows an attacker who can intercept or redirect update traffic to cause the updater to download and execute an attacker-controlled installer, leading to arbitrary code execution with the privileges of the user. This issue is actively being exploited in attacks, and has been added to CISA’s Known Exploited Vulnerabilities catalog. Attackers may use man-in-the-middle (MitM) techniques or DNS spoofing to redirect users to malicious installers, potentially deploying ransomware, malware droppers, or establishing persistent backdoors.
Recommendations
Update Notepad++ to version 8.8.9 or later.
Fix
Found an issue in the description? Have something to add? Feel free to write us 👾
dbugs@ptsecurity.com
Related Identifiers
BDU:2025-15900
CVE-2025-15556
Affected Products
Notepad++
References · 39
- https://github.com/notepad-plus-plus/notepad-plus-plus/commit/bcf2aa68ef414338d717e20e059459570ed6c5ab⭐ 27033 🔗 5096 · Patch
- https://github.com/notepad-plus-plus/wingup/commit/ce0037549995ed0396cc363544d14b3425614fdb⭐ 72 🔗 38 · Patch
- https://community.notepad-plus-plus.org/topic/27298/notepad-v8-8-9-vulnerability-fix · Patch, Security Note
- https://osv.dev/vulnerability/CVE-2025-15556 · Vendor Advisory
- https://nvd.nist.gov/vuln/detail/CVE-2025-15556 · Security Note
- https://notepad-plus-plus.org//news//clarification-security-incident · Vendor Advisory
- https://notepad-plus-plus.org/news/hijacked-incident-info-update · Vendor Advisory
- https://bdu.fstec.ru/vul/2025-15900 · Security Note
- https://notepad-plus-plus.org/news/clarification-security-incident · Security Note
- https://twitter.com/transilienceai/status/2022151786874671599 · Twitter Post
- https://twitter.com/CVEnew/status/2018497456242380979 · Twitter Post
- https://twitter.com/alaamurad/status/2022352891340538365 · Twitter Post
- https://twitter.com/The_Cyber_News/status/2022193016342294716 · Twitter Post
- https://twitter.com/CISACyber/status/2022050902236946894 · Twitter Post
- https://t.me/CSIRT_italia/3127 · Telegram Post