The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2025-15556

CVE-2025-15556: Notepad++ WinGUp Updater RCE Vulnerability

CVE-2025-15556 is an RCE flaw in Notepad++ WinGUp updater affecting versions before 8.8.9. Attackers can intercept update traffic to execute malicious code. This article covers technical details, affected versions, and mitigations.

Updated: March 12, 2026

CVE-2025-15556 Overview

CVE-2025-15556 is a critical update integrity verification vulnerability affecting Notepad++ versions prior to 8.8.9 when using the WinGUp updater component. The vulnerability stems from a failure to cryptographically verify downloaded update metadata and installers, allowing attackers who can intercept or redirect update traffic to deliver and execute malicious installers with the privileges of the current user.

This vulnerability falls under CWE-494 (Download of Code Without Integrity Check), representing a significant supply chain security risk. Attackers positioned to perform man-in-the-middle attacks on update traffic can leverage this flaw to achieve arbitrary code execution on vulnerable systems.

Critical Impact

This vulnerability is listed in CISA's Known Exploited Vulnerabilities (KEV) catalog, indicating active exploitation in the wild. Attackers can achieve arbitrary code execution by intercepting Notepad++ update traffic and delivering malicious installers without cryptographic verification.

Affected Products

  • Notepad++ versions prior to 8.8.9
  • WinGUp updater component (bundled with Notepad++)

Discovery Timeline

  • 2026-02-03 - CVE-2025-15556 published to NVD
  • 2026-02-13 - Last updated in NVD database

Technical Details for CVE-2025-15556

Vulnerability Analysis

The vulnerability exists in the WinGUp updater component used by Notepad++ for automatic updates. Prior to version 8.8.9, the updater downloaded update metadata and installer binaries without performing cryptographic verification of their authenticity or integrity. This means the application trusted any content received over the network without validating that it originated from the legitimate Notepad++ developers or that it hadn't been tampered with in transit.

The lack of code signing verification creates a classic supply chain attack surface. When a user triggers an update check, the WinGUp component fetches update information and, if available, downloads the new installer. Without cryptographic verification, an attacker who can manipulate the network traffic—through DNS hijacking, BGP hijacking, compromised CDN, or local network attacks—can substitute the legitimate installer with a malicious payload.

Root Cause

The root cause is the absence of cryptographic integrity verification for downloaded binaries in the WinGUp updater. The original implementation called verifySignedLibrary() which did not properly validate the code signing certificate and signature on update installers. The fix introduced verifySignedBinary() along with proper certificate validation infrastructure including signer display name, subject, key ID, and authority key ID verification.

Attack Vector

The attack requires network-level access to intercept or redirect update traffic between the victim's Notepad++ installation and the update servers. This can be accomplished through:

  1. Man-in-the-Middle (MitM) attacks on local networks or compromised network infrastructure
  2. DNS hijacking to redirect update server lookups to attacker-controlled servers
  3. Compromised update infrastructure if attackers gain access to distribution points
  4. BGP hijacking for larger-scale attacks targeting specific IP ranges

Once positioned, the attacker serves a malicious installer that the WinGUp component downloads and executes without verification, resulting in arbitrary code execution with the user's privileges.

cpp
// Security patch in verifySignedfile.cpp - Changed from verifySignedLibrary to verifySignedBinary
// Source: https://github.com/notepad-plus-plus/notepad-plus-plus/commit/bcf2aa68ef414338d717e20e059459570ed6c5ab

 {
 #ifndef _DEBUG
 	if (_securityMode == sm_certif)
-		return verifySignedLibrary(filePath);
+		return verifySignedBinary(filePath);
 	else if (_securityMode == sm_sha256)
 		return checkSha256(filePath, module2check);
 	else

The fix also added proper certificate verification infrastructure:

c
// Security patch in verifySignedfile.h - Added certificate verification fields
// Source: https://github.com/notepad-plus-plus/notepad-plus-plus/commit/bcf2aa68ef414338d717e20e059459570ed6c5ab

 {
 public:
 	SecurityGuard();
+
 	bool checkModule(const std::wstring& filePath, NppModule module2check);

+	std::wstring signer_display_name() { return _signer_display_name; }
+	std::wstring signer_subject() { return _signer_subject; }
+	std::wstring signer_key_id() { return _signer_key_id; }
+	std::wstring authority_key_id() { return _authority_key_id; }

 private:
 	// SHA256
 	static SecurityMode _securityMode;

Detection Methods for CVE-2025-15556

Indicators of Compromise

  • Unexpected network connections from GUP.exe (WinGUp updater) to non-standard update servers
  • Notepad++ installer files with invalid or missing code signatures
  • Unusual process spawning from GUP.exe or notepad++.exe during update operations
  • Modified or unsigned binaries in Notepad++ installation directories

Detection Strategies

  • Monitor for GUP.exe process activity and validate destination IPs against known legitimate Notepad++ update servers
  • Implement network-based detection for update traffic to unexpected destinations
  • Use endpoint detection to alert on execution of unsigned binaries from Notepad++ directories
  • Deploy file integrity monitoring on Notepad++ installation paths

Monitoring Recommendations

  • Enable logging for application updates and verify installer signatures before deployment
  • Monitor DNS queries for Notepad++ update domains for potential hijacking attempts
  • Track process execution chains involving GUP.exe for anomalous child processes
  • Review network traffic patterns for update-related communications

How to Mitigate CVE-2025-15556

Immediate Actions Required

  • Upgrade Notepad++ to version 8.8.9 or later immediately
  • Verify installed Notepad++ binary signatures using Windows certificate verification
  • Review systems for indicators of compromise if previously exposed
  • Consider blocking automatic updates until systems are upgraded, then perform manual verified updates

Patch Information

The vulnerability has been addressed in Notepad++ version 8.8.9 with the introduction of proper code signing certificate verification. The fix modifies the WinGUp updater to validate both the certificate and signature of downloaded installers before execution.

Key fixes were implemented in:

  • Notepad++ main repository commit
  • WinGUp updater commit

Additional details are available in the Notepad++ v8.8.9 vulnerability fix announcement and the official security incident clarification.

Workarounds

  • Disable automatic updates in Notepad++ preferences until the application can be upgraded
  • Download Notepad++ installers only from the official website and manually verify digital signatures
  • Use network segmentation to limit potential MitM attack vectors
  • Deploy application whitelisting to prevent execution of unsigned binaries
bash
# Verify Notepad++ installer signature on Windows using PowerShell
Get-AuthenticodeSignature "C:\Path\To\npp.8.8.9.Installer.exe" | Format-List

# Check for valid signature status - should show "Valid" for legitimate installers
# SignerCertificate should show "Notepad++" as the subject

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeRCE

  • Vendor/TechNotepad Plus Plus

  • SeverityHIGH

  • CVSS Score7.7

  • EPSS Probability4.26%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
  • Impact Assessment
  • ConfidentialityHigh
  • IntegrityHigh
  • AvailabilityHigh
  • CISA KEV Information
  • In CISA KEVYes
  • CWE References
  • CWE-494
  • Technical References
  • Notepad++ Vulnerability Fix

  • VulnCheck Advisory on Wingup

  • CISA CVE-2025-15556 Entry
  • Vendor Resources
  • GitHub Commit for Fix

  • Wingup Commit Details

  • Notepad++ Hijacked Incident Update

  • Notepad++ Security Incident Clarification
  • Related CVEs
  • CVE-2026-25926: Notepad++ RCE Vulnerability

  • CVE-2025-56383: Notepad++ v8.8.3 DLL Hijacking RCE Flaw

  • CVE-2022-32168: Notepad++ DLL Hijacking RCE Vulnerability

  • CVE-2023-40031: Notepad++ RCE Vulnerability
Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English