Notepad++ <= 8.9.3 Stack-based Buffer Overflow (CVE-2026-5525)

medium Nessus Plugin ID 306546

Synopsis

A text editor on the remote Windows host is affected by a stack-based buffer overflow vulnerability.

Description

The version of Notepad++ installed on the remote host is 8.9.3 or earlier. It is, therefore, affected by a stack-based buffer overflow vulnerability:

- A stack-based buffer overflow exists in the file drop handler component (WM_DROPFILES). When a user drags and drops a directory path of exactly 259 characters without a trailing backslash, the application appends a backslash and null terminator without proper bounds checking, resulting in a stack buffer overflow and application crash. (CVE-2026-5525)

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.

Solution

Upgrade to a version of Notepad++ later than 8.9.3 when available.

See Also

https://github.com/notepad-plus-plus/notepad-plus-plus/issues/17921

https://github.com/notepad-plus-plus/notepad-plus-plus/pull/17930

http://www.nessus.org/u?edb17e85

Plugin Details

Severity: Medium

ID: 306546

File Name: notepad_plus_plus_CVE-2026-5525.nasl

Version: 1.1

Type: Local

Agent: windows

Family: Windows

Published: 4/15/2026

Updated: 4/15/2026

Configuration: Enable thorough checks (optional)

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.0

CVSS v2

Risk Factor: Medium

Base Score: 5.6

Vector: CVSS2#AV:L/AC:H/Au:N/C:C/I:C/A:N

CVSS Score Source: CVE-2026-5525

CVSS v3

Risk Factor: Medium

Base Score: 6

Vector: CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:N

CVSS v4

Risk Factor: Medium

Base Score: 5.3

Vector: CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:A/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N

Vulnerability Information

CPE: cpe:/a:notepad-plus-plus:notepad%5c%2b%5c%2b

Required KB Items: SMB/Registry/Enumerated, installed_sw/Notepad++

Vulnerability Publication Date: 3/31/2026

Reference Information

CVE: CVE-2026-5525