Complete end-of-life dates, support windows, and security status for all Notepad Plus Plus versions. Data sourced from endoflife.date and official vendor documentation. Updated at every deploy.
| Version | Latest Release | Release Date | EOL Date | Days | Status |
|---|---|---|---|---|---|
| 7.9 | 7.9.5 | Sep 28, 2020 | Jun 17, 2021 | 1787 days past EOL | EOL |
| 8.1 | 8.1.9.3 | Jun 17, 2021 | Jan 1, 2022 | 1589 days past EOL | EOL |
| 8.2 | 8.2.1 | Jan 1, 2022 | Feb 3, 2022 | 1556 days past EOL | EOL |
| 8.3 | 8.3.3 | Feb 3, 2022 | Apr 26, 2022 | 1474 days past EOL | EOL |
| 8.4 | 8.4.9 | Apr 26, 2022 | Mar 6, 2023 | 1160 days past EOL | EOL |
| 8.5 | 8.5.8 | Mar 6, 2023 | Nov 23, 2023 | 898 days past EOL | EOL |
| 8.6 | 8.6.9 | Nov 23, 2023 | Sep 17, 2024 | 599 days past EOL | EOL |
| 8.7 | 8.7.9 | Sep 17, 2024 | Apr 28, 2025 | 376 days past EOL | EOL |
| 8.8 | 8.8.9 | Apr 28, 2025 | Dec 27, 2025 | 133 days past EOL | EOL |
| 8.9 | 8.9.4 | Dec 27, 2025 | Already EOL | Supported | Active |
When a Notepad Plus Plus version reaches end of life, the maintainers stop issuing security patches. Vulnerabilities discovered after this date are publicly disclosed on the National Vulnerability Database, exploit code appears on GitHub, and your systems remain permanently exposed.
The CVE blind spot: Most vulnerability scanners check for known CVEs but do not flag the accumulation of unpatched vulnerabilities in EOL software. With a zero-day, nobody knows about the vulnerability. With EOL software, the vulnerability is public — listed, rated, and often weaponized — but no patch will ever exist. This is the most dangerous gap in enterprise security posture.
Organizations running EOL Notepad Plus Plus should treat it as a vulnerability class in their risk register, apply compensating controls (network segmentation, enhanced monitoring, access restriction), and prioritize migration to a supported version.
Upload requirements.txt, package.json, or Gemfile — full EOL report instantly.
Open Stack Scanner →