Notepad++ 8.9.4 Fixes Vulnerability That Could Crash the App and Expose Memory Data


Notepad++ users should update to version 8.9.4 after maintainers fixed a security issue that could allow attackers to crash the application or expose memory address information.

The vulnerability is tracked as CVE-2026-3008 and affects Notepad++ 8.9.3. Singapore’s Cyber Security Agency says successful exploitation of the string injection flaw could let an attacker obtain memory address information or crash the application.

Notepad++ 8.9.4 also references CVE-2026-6539 in the same fix, along with several other crash-related bugs. The update was released on April 26, 2026.

What is the Notepad++ vulnerability?

The issue sits in the Find in Files feature. According to the official Notepad++ 8.9.4 release notes, the crash happens when the find-result-hits entry inside nativeLang.xml contains %s.

That sounds narrow, but it still matters for developers, administrators, and security teams who use Notepad++ every day. A crafted or modified language configuration file could trigger unstable behavior during search operations.

The main risk is not remote code execution. The confirmed impact is application crash and possible memory address disclosure. Still, memory leaks can help attackers plan follow-up attacks by weakening protections such as address randomization.

Affected version and fixed version

ItemDetails
VulnerabilityCVE-2026-3008
Related fix referenceCVE-2026-6539
Affected productNotepad++
Affected version8.9.3
Fixed version8.9.4
Main componentFind in Files
Trigger%s inside nativeLang.xml find-result-hits
ImpactApp crash or memory address information leak

Users running Notepad++ 8.9.3 should install version 8.9.4 as soon as possible. Enterprise administrators should also check managed workstations because Notepad++ often runs outside centralized software inventories.

Users on older versions should update as well. The official advisory names 8.9.3 as affected, but older builds may also miss recent security hardening and crash fixes.

Why this matters for businesses

Notepad++ has a large footprint across developer machines, IT departments, support teams, and security operations. Even a crash-only flaw can disrupt work when the editor handles logs, scripts, configuration files, and incident response notes.

The memory disclosure angle gives the bug more weight. Memory address information can help attackers bypass protections in more complex exploit chains, especially when combined with other weaknesses.

This does not mean every Notepad++ user faces immediate compromise. It means organizations should treat the patch as a normal security update, not just a minor bug-fix release.

What Notepad++ 8.9.4 changes

Notepad++ 8.9.4 fixes the Find in Files crash tied to nativeLang.xml and the %s string. The official changelog lists the fix under issue #17960 and names both CVE-2026-3008 and CVE-2026-6539.

The same release also fixes a crash when dropping a file with a path length of 259 characters. It also addresses crashes linked to bad column editor input in virtual space.

The update includes other bug fixes and improvements, but the security-related Find in Files fix should be the priority for users and administrators.

What users should do now

  • Update Notepad++ to version 8.9.4 from the official website.
  • Avoid downloading installers from mirrors, repack sites, or unofficial software bundles.
  • Check the installed version from the Notepad++ Help menu.
  • Review systems that use custom nativeLang.xml files or language packs.
  • Push the update through normal patch management tools in business environments.
  • Monitor developer and admin workstations for repeated Notepad++ crashes.

For most users, installing version 8.9.4 should be enough. Teams that distribute customized Notepad++ language files should review those files and replace older builds quickly.

FAQ

What is CVE-2026-3008?

CVE-2026-3008 is a string injection vulnerability in Notepad++ 8.9.3. It can crash the application or expose memory address information.

Which Notepad++ version is affected?

The official CSA advisory lists Notepad++ 8.9.3 as affected.

Which version fixes the vulnerability?

Notepad++ 8.9.4 fixes the issue.

Does this vulnerability allow remote code execution?

The confirmed impact is application crash and memory address disclosure. Official advisories do not describe it as remote code execution.

Readers help support VPNCentral. We may get a commission if you buy through our links. Tooltip Icon

Read our disclosure page to find out how can you help VPNCentral sustain the editorial team Read more

User forum

0 messages