PT-2025-41203 · Igor Pavlov+2 · 7-Zip+2
Published
2025-01-01
·
Updated
2026-02-28
·
CVE-2025-11001
CVSS v3.1
7.8
7.8
High
| Base vector | Vector | AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H |
Name of the Vulnerable Software and Affected Versions
7-Zip versions prior to 25.01
7-Zip versions 21.02 through 24.99
Description
7-Zip is affected by a remote code execution vulnerability due to improper handling of symbolic links within ZIP files. A crafted ZIP file can cause the process to traverse to unintended directories, potentially allowing an attacker to execute code in the context of a service account. This vulnerability is actively being exploited in the wild, with reports of attacks targeting Windows systems. The NHS in England has issued a cyber alert regarding this issue. The vulnerability allows attackers to write files outside the intended extraction folder, potentially delivering malware or achieving full code execution. The vulnerability is triggered simply by opening a malicious ZIP file.
API Endpoints:
None mentioned.
Vulnerable Parameters or Variables:
None mentioned.
Function Names:
None mentioned.
Recommendations
Update to 7-Zip version 25.00 or later.
Update to 7-Zip version 25.01.
Exploit
Fix
RCE
Path traversal
Link Following
Found an issue in the description? Have something to add? Feel free to write us 👾
Related Identifiers
BDU:2025-12910
BDU:2025-12912
CVE-2025-11001
ZDI-25-949
Affected Products
7-Zip
Debian
Red Os
References · 183
- 🔥 https://github.com/pacbypass/CVE-2025-11001⭐ 143 🔗 22 · Exploit
- https://cve.org/CVERecord?id=CVE-2025-11001 · Security Note
- https://wiki.astralinux.ru/astra-linux-se47-bulletin-2025-1020SE47 · Vendor Advisory
- https://security-tracker.debian.org/tracker/CVE-2025-11001 · Vendor Advisory
- https://zerodayinitiative.com/advisories/ZDI-25-949 · Security Note
- https://wiki.astralinux.ru/astra-linux-se38-bulletin-2026-0126SE38 · Vendor Advisory
- https://nvd.nist.gov/vuln/detail/CVE-2025-11001 · Security Note
- https://bdu.fstec.ru/vul/2025-12910 · Security Note
- https://osv.dev/vulnerability/UBUNTU-CVE-2025-11001 · Vendor Advisory
- https://wiki.astralinux.ru/astra-linux-se17-bulletin-2025-1202SE17 · Vendor Advisory
- https://ubuntu.com/security/CVE-2025-11001 · Vendor Advisory
- https://osv.dev/vulnerability/DEBIAN-CVE-2025-11001 · Vendor Advisory
- https://bdu.fstec.ru/vul/2025-12912 · Security Note
- https://osv.dev/vulnerability/CVE-2025-11001 · Vendor Advisory
- https://github.com/ip7z/7zip/releases/tag/25.01⭐ 2358 🔗 213 · Note