PT-2025-41203 · Igor Pavlov +2 · 7-Zip +2

Published

2025-01-01

·

Updated

2026-01-13

·

CVE-2025-11001

CVSS v3.1
7.8
VectorAV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Name of the Vulnerable Software and Affected Versions 7-Zip versions prior to 25.01 7-Zip versions 21.02 through 24.99
Description 7-Zip is affected by a remote code execution vulnerability due to improper handling of symbolic links within ZIP files. A crafted ZIP file can cause the process to traverse to unintended directories, potentially allowing an attacker to execute code in the context of a service account. This vulnerability is actively being exploited in the wild, with reports of attacks targeting Windows systems. The NHS in England has issued a cyber alert regarding this issue. The vulnerability allows attackers to write files outside the intended extraction folder, potentially delivering malware or achieving full code execution. The vulnerability is triggered simply by opening a malicious ZIP file.
API Endpoints: None mentioned.
Vulnerable Parameters or Variables: None mentioned.
Function Names: None mentioned.
Recommendations Update to 7-Zip version 25.00 or later. Update to 7-Zip version 25.01.

Exploit

Fix

RCE

Link Following

Path traversal

Weakness Enumeration

Related Identifiers

BDU:2025-12910
BDU:2025-12912
CVE-2025-11001
ZDI-25-949

Affected Products

7-Zip
Debian
Red Os