PT-2026-20553 · Tabnine · Notepad++
Mariorl0
·
Published
2026-02-16
·
Updated
2026-03-10
·
CVE-2026-25926
CVSS v3.1
7.3
High
| AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H |
Name of the Vulnerable Software and Affected Versions
Notepad++ versions prior to 8.9.2
Description
Notepad++ is a free and open-source source code editor. An Unsafe Search Path issue (CWE-426) exists when launching Windows Explorer without an absolute executable path. This could allow execution of a malicious
explorer.exe if an attacker can control the process working directory. Under certain conditions, this could lead to arbitrary code execution in the context of the running application. The vulnerability was exploited in attacks where malicious actors targeted the update mechanism to distribute malware, such as Chrysalis. The update mechanism now verifies file signatures and XML file signatures from update servers to prevent data tampering and malicious DLL loading.Recommendations
Update Notepad++ to version 8.9.2 or later.
Exploit
Fix
Uncontrolled Search Path Element
Untrusted Search Path
Found an issue in the description? Have something to add? Feel free to write us 👾
Related Identifiers
Affected Products
Notepad++