PT-2025-26225 · Winrar · Winrar
Marcin Bobryk
·
Published
2025-06-19
·
Updated
2025-08-30
·
CVE-2025-6218
7.8
High
Base vector | Vector | AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H |
**Name of the Vulnerable Software and Affected Versions:**
WinRAR versions prior to 7.12
**Description:**
WinRAR contains a directory traversal vulnerability that allows remote attackers to execute arbitrary code on affected systems. User interaction is required, as the target must open a malicious archive file. The vulnerability stems from improper handling of file paths within archive files, enabling crafted paths to traverse to unintended directories, potentially including system folders like Startup. Exploitation can lead to the automatic execution of malicious code in the context of the current user. The Paper Werewolf threat group has been observed exploiting this vulnerability (CVE-2025-6218) in targeted attacks against Russian organizations. Approximately 500 million users worldwide may be affected. A proof-of-concept exploit is publicly available.
**Recommendations:**
Update WinRAR to version 7.12 or later to address this vulnerability.
Exploit
Fix
RCE
Path traversal
Weakness Enumeration
Related Identifiers
Affected Products
References · 63
- 🔥 https://github.com/speinador/CVE-2025-6218_WinRAR⭐ 14 🔗 4 · Exploit
- https://safe-surf.ru/specialists/bulletins-nkcki/722058 · Security Note
- https://bdu.fstec.ru/vul/2025-07480 · Security Note
- https://zerodayinitiative.com/advisories/ZDI-25-409 · Security Note
- https://nvd.nist.gov/vuln/detail/CVE-2025-6218 · Security Note
- https://win-rar.com/singlenewsview.html?&tx_ttnews%5Btt_news%5D=276&cHash=388885bd3908a40726f535c026f94eb6 · Vendor Advisory
- https://reddit.com/r/CyberDudeBivash/comments/1mvxk3x/nationstate_threats_the_silent_war_in_cyberspace · Reddit Post
- https://t.me/latest_high_impact_cve/2746 · Telegram Post
- https://t.me/pentestingnews/63294 · Telegram Post
- https://twitter.com/bizone_en/status/1958072803862679671 · Twitter Post
- https://twitter.com/NormanOre/status/1938117770169770373 · Twitter Post
- https://reddit.com/r/CVEWatch/comments/1m0ds56/top_10_trending_cves_15072025 · Reddit Post
- https://t.me/breachdetector/805303 · Telegram Post
- https://t.me/aptreports/21481 · Telegram Post
- https://twitter.com/cynical_sec/status/1943262340411003144 · Twitter Post