CVE-2026-5525 – Notepad++ Stack-Based Buffer Overflow (DoS) Zero-day Vulnerability
A stack-based buffer overflow zero-day vulnerability has been identified in Notepad++ v8.9.3, specifically within the file drop handler component. The following are the vulnerability details:
- CVE ID: CVE-2026-5525
- Affected Version: Notepad++ 8.9.3
- Component: File Drop Handler (
Notepad_plus.cpp, lines 4514–4526) - Type: Stack-Based Buffer Overflow
The issue occurs when a user drags and drops a directory path of exactly 259 characters (MAX_PATH - 1) without a trailing backslash into the Notepad++ window.
During processing, the application attempts to append:
- A backslash (
\) - A null terminator
However, due to insufficient bounds checking, this results in writing beyond the allocated buffer (wchar_t pathDropped[MAX_PATH]), causing a stack buffer overflow.
Impact - Denial of Service (DoS):
As of now, no official patch has been released, so users are advised to take precautionary measures:
- Avoid dragging and dropping long or untrusted directory paths into Notepad++
- Open files using File → Open instead of drag-and-drop when possible
- Ensure frequent saving of work to prevent data loss from unexpected crashes
- Limit exposure by avoiding use of affected versions in critical environments
- Monitor vendor releases and update immediately once a patch is available
Cheers,
ManageEngine Team