Notepad++ is a free and open-source source code editor. In versions 8.8.1 and prior, a privilege escalation vulnerability exists in the Notepad++ v8.8.1 installer that allows unprivileged users to gain SYSTEM-level privileges through insecure executable search paths. An attacker could use social engineering or clickjacking to trick users into downloading both the legitimate installer and a malicious executable to the same directory (typically Downloads folder - which is known as Vulnerable directory). Upon running the installer, the attack executes automatically with SYSTEM privileges. This issue has been fixed and will be released in version 8.8.2.
- https://drive.google.com/drive/folders/11yeUSWgqHvt4Bz5jO3ilRRfcpQZ6Gvpn
- https://github.com/notepad-plus-plus/notepad-plus-plus/security/advisories/GHSA-9vx8-v79m-6m24
- https://github.com/0xCZR1/cve-2025-49144
- https://github.com/0xMarcio/cve
- https://github.com/Andromeda254/cve
- https://github.com/GhostTroops/TOP
- https://github.com/GiZcesi/HJregsvr32
- https://github.com/PuddinCat/GithubRepoSpider
- https://github.com/TheTorjanCaptain/CVE-2025-49144_PoC
- https://github.com/Vr00mm/CVE-2025-49144
- https://github.com/a1batr0ssG/VulhubExpand
- https://github.com/ammarm0010/CVE-2025-49144_PoC
- https://github.com/assad12341/notepad-v8.8.1-LPE-CVE-
- https://github.com/b0ySie7e/Notepad-8.8.1_CVE-2025-49144
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/onniio/CVE-2025-49144
- https://github.com/plzheheplztrying/cve_monitor
- https://github.com/tanjiti/sec_profile
- https://github.com/timsonner/CVE-2025-49144-Research
- https://github.com/tristanvandermeer/CVE-2025-49144-Test