PT-2025-26225 · Winrar · Winrar
Marcin Bobryk
·
Published
2025-06-19
·
Updated
2026-05-07
·
CVE-2025-6218
CVSS v3.1
7.8
High
| Vector | AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H |
Name of the Vulnerable Software and Affected Versions
WinRAR versions prior to 7.12.
Description
WinRAR contains a directory traversal vulnerability (CVE-2025-6218) that allows remote attackers to execute arbitrary code. This occurs when opening a specially crafted archive file. The vulnerability is actively exploited by multiple threat actors, including APT groups like Paper Werewolf, Bitter, and Gamaredon. Attackers can leverage this flaw to execute code in the context of the current user. The vulnerability has been observed in attacks targeting various regions, including Russia, Ukraine, and others. Exploitation involves manipulating file paths within the archive to write files outside the intended directory, potentially leading to the execution of malicious code. The vulnerability is actively exploited in the wild, with threat actors utilizing it in phishing campaigns and deploying malware.
Recommendations
Update WinRAR to version 7.12 or later.
Exploit
Fix
RCE
Path traversal
Found an issue in the description? Have something to add? Feel free to write us 👾
Weakness Enumeration
Related Identifiers
Affected Products
Winrar