Notepad++ versions prior to 8.8.9, when using the WinGUp updater, contain an update integrity verification vulnerability where downloaded update metadata and installers are not cryptographically verified. An attacker able to intercept or redirect update traffic can cause the updater to download and execute an attacker-controlled installer, resulting in arbitrary code execution with the privileges of the user.
References
Configurations
History
13 Feb 2026, 14:03
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:notepad-plus-plus:notepad\+\+:*:*:*:*:*:*:*:* | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.5 |
| First Time |
Notepad-plus-plus
Notepad-plus-plus notepad\+\+ |
|
| References | () https://community.notepad-plus-plus.org/topic/27298/notepad-v8-8-9-vulnerability-fix - Release Notes | |
| References | () https://github.com/notepad-plus-plus/notepad-plus-plus/commit/bcf2aa68ef414338d717e20e059459570ed6c5ab - Patch | |
| References | () https://github.com/notepad-plus-plus/wingup/commit/ce0037549995ed0396cc363544d14b3425614fdb - Patch | |
| References | () https://notepad-plus-plus.org/news/hijacked-incident-info-update/ - Patch, Vendor Advisory | |
| References | () https://www.vulncheck.com/advisories/notepad-plus-plus-wingup-updater-lacks-update-integrity-verification - Third Party Advisory | |
| References | () https://notepad-plus-plus.org//news//clarification-security-incident/ - Vendor Advisory | |
| References | () https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-15556 - US Government Resource |
12 Feb 2026, 19:15
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
03 Feb 2026, 01:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-02-03 01:15
Updated : 2026-02-13 14:03
NVD link : CVE-2025-15556
Mitre link : CVE-2025-15556
CVE.ORG link : CVE-2025-15556
JSON object : View
Products Affected
notepad-plus-plus
- notepad\+\+
CWE
CWE-494
Download of Code Without Integrity Check
