Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Fri, 10 Apr 2026 14:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Notepad++
Notepad++ notepad++ Notepad-plus-plus Notepad-plus-plus notepad++ |
|
| Vendors & Products |
Notepad++
Notepad++ notepad++ Notepad-plus-plus Notepad-plus-plus notepad++ |
Fri, 10 Apr 2026 13:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 10 Apr 2026 08:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A stack-based buffer overflow vulnerability exists in Notepad++ version 8.9.3 in the file drop handler component. When a user drags and drops a directory path of exactly 259 characters without a trailing backslash, the application appends a backslash and null terminator without proper bounds checking, resulting in a stack buffer overflow and application crash (STATUS_STACK_BUFFER_OVERRUN). | |
| Title | Stack-Based Buffer Overflow in Notepad++ File Drop Handler leads to DoS | |
| Weaknesses | CWE-121 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: securin
Published:
Updated: 2026-04-10T12:49:59.124Z
Reserved: 2026-04-04T05:59:46.561Z
Link: CVE-2026-5525
Updated: 2026-04-10T12:49:44.644Z
Status : Awaiting Analysis
Published: 2026-04-10T08:16:26.067
Modified: 2026-04-13T15:02:06.187
Link: CVE-2026-5525
No data.
OpenCVE Enrichment
Updated: 2026-04-10T14:40:55Z