CVE-2025-56383
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-09-26

Last updated on: 2025-11-19

Assigner: MITRE

Description
Notepad++ v8.8.3 has a DLL hijacking vulnerability, which can replace the original DLL file to execute malicious code. NOTE: this is disputed by multiple parties because the behavior only occurs when a user installs the product into a directory tree that allows write access by arbitrary unprivileged users.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-09-26
Last Modified
2025-11-19
Generated
2026-05-07
AI Q&A
2025-12-23
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
notepad++ notepad++ 8.8.3
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-427 The product uses a fixed or controlled search path to find resources, but one or more locations in that path can be under the control of unintended actors.
Attack-Flow Graph
AI Powered Q&A
How can this vulnerability be detected on my network or system? Can you suggest some commands?

Detection of CVE-2025-56383 can be performed using a detection script created by the user @mortem, as referenced by the vsociety initiative. However, no specific commands or detailed technical detection methods are provided in the available resources. [1]


Can you explain this vulnerability to me?

This vulnerability in Notepad++ v8.8.3 is a DLL hijacking issue where an attacker can replace the original DLL file with a malicious one, causing the application to execute malicious code.


How can this vulnerability impact me? :

If exploited, this vulnerability can allow an attacker to run malicious code on your system with the privileges of the Notepad++ application, potentially leading to unauthorized actions or system compromise.


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include using a mitigation script developed by the user @mortem as part of a community effort. Additionally, users should ensure Notepad++ is installed in a directory that does not allow write access by unprivileged users, such as the default 'Program Files' directory on Windows, to prevent DLL hijacking. Applying any official patches or updates from the vendor is also advised. [3, 5]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart