Skip to main content

Command Palette

Search for a command to run...

CVE‑2025‑49144 – Local Privilege Escalation in Notepad++

Updated
1 min read
CVE‑2025‑49144 – Local Privilege Escalation in Notepad++

CVE‑2025‑49144 is a newly disclosed privilege escalation vulnerability affecting Notepad++ v8.8.1. Despite being a local attack, it poses a serious risk due to ease of exploitation and availability of proof-of-concept code in the wild.

FieldValue
ProductNotepad++ v8.8.1
CVSS v3.17.3 (High)
ExploitLocal attacker can escalate to NT AUTHORITY\SYSTEM via binary planting
PoCProof-of-concept code is already in circulation :contentReference[oaicite:1]{index=1}

Why It Matters

  • The vulnerability allows a local user or compromised account to gain full system control—high impact for desktops and developer workstations.

  • Notepad++ is widely used by sysadmins and developers, making it a common target.

  • The released PoC lowers the barrier for exploitation, increasing urgency.


  1. Update Immediately to the latest patched version of Notepad++.

  2. Restrict write-permissions to Notepad++ directories on shared systems.

  3. Monitor privileged process launches originating from Notepad++ (EDR or SIEM).


Key Takeaway

Local privileges can be just as dangerous as remote exploits—particularly for trusted applications. Treat released PoCs as an urgent indicator and act accordingly.

Briefings

Part 4 of 9

Timely breakdowns of high-impact vulnerabilities and trends. Focus on business relevance, risk context, and action steps — not technical deep dives.

Up next

Not All Low CVSS Scores Are Low Risk

Understanding Why CVE-2016-3351 is on CISA's KEV List with a Low CVSS Score