Description
Notepad++ 8.9.3 contains a format string injection vulnerability in the Find Results panel handler that allows attackers to cause denial of service and information disclosure by crafting a malicious nativeLang.xml language pack file. Attackers can distribute a poisoned language pack through community channels that triggers format string interpretation when a user performs search operations, leading to access violations and potential leakage of stack or register contents.
Published: 2026-04-30
Score: 4.6 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The vulnerability is a format string injection in the Find Results panel handler of Notepad++ 8.9.3. By supplying a crafted nativeLang.xml language‑pack file, an attacker can cause the application to interpret format string directives during search operations, leading to access violations, stack or register memory leaks, and user‑visible denial of service. The primary impact is therefore interruption of application availability and potential exposure of sensitive data that resides in memory at the time of exploitation. The weakness is identified as CWE‑134, a classic format string injection flaw.

Affected Systems

Notepad++ version 8.9.3. Users who have installed or enabled custom language‑pack files, specifically nativeLang.xml, are affected. No other Notepad++ versions or editions are known to be vulnerable. The impact is confined to systems running this exact build and that have loaded the malicious language‑pack.

Risk and Exploitability

The CVSS score is 4.6, indicating moderate risk. EPSS data is not available, suggesting a low or unknown exploitation probability at the time of assessment. The vulnerability is not listed in the CISA KEV catalog. The likely attack vector is inferred to involve users acquiring and installing a poisoned language‑pack file from community channels such as forum or plugin sites; the exploitation then occurs when a search operation is performed, triggering the injected format string. Because the attack requires user action to load the malicious file, the vulnerability is most useful against motivated threat actors who can distribute or embed the language‑pack in phishing or social engineering campaigns.

Generated by OpenCVE AI on May 2, 2026 at 00:16 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade to the latest Notepad++ release that includes the corrected nativeLang.xml parsing logic.
  • Delete any custom language‑pack files, including nativeLang.xml, from the application’s language folder.
  • Avoid installing language packs from untrusted community sources and restrict file extensions allowed in the language‑pack directory.

Generated by OpenCVE AI on May 2, 2026 at 00:16 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 01 May 2026 19:30:00 +0000

Type Values Removed Values Added
First Time appeared Notepad-plus-plus
Notepad-plus-plus notepad\+\+
CPEs cpe:2.3:a:notepad-plus-plus:notepad\+\+:8.9.3:*:*:*:*:*:*:*
Vendors & Products Notepad-plus-plus
Notepad-plus-plus notepad\+\+

Fri, 01 May 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 30 Apr 2026 22:45:00 +0000

Type Values Removed Values Added
First Time appeared Notepad++
Notepad++ notepad++
Vendors & Products Notepad++
Notepad++ notepad++

Thu, 30 Apr 2026 20:45:00 +0000

Type Values Removed Values Added
Description Notepad++ 8.9.3 contains a format string injection vulnerability in the Find Results panel handler that allows attackers to cause denial of service and information disclosure by crafting a malicious nativeLang.xml language pack file. Attackers can distribute a poisoned language pack through community channels that triggers format string interpretation when a user performs search operations, leading to access violations and potential leakage of stack or register contents.
Title Notepad++ 8.9.3 Format String Injection via nativeLang.xml
Weaknesses CWE-134
References
Metrics cvssV3_1

{'score': 4.4, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L'}

cvssV4_0

{'score': 4.6, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N'}


Subscriptions

Notepad++ Notepad++
Notepad-plus-plus Notepad\+\+
cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-05-01T14:21:46.872Z

Reserved: 2026-04-17T17:20:47.595Z

Link: CVE-2026-6539

cve-icon Vulnrichment

Updated: 2026-05-01T14:21:41.026Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-30T21:16:33.820

Modified: 2026-05-01T19:30:02.887

Link: CVE-2026-6539

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-02T00:30:16Z

Weaknesses