PT-2025-32352 · Rarlab+1 · Winrar

Anton Cherepanov

+2

·

Published

2025-07-30

·

Updated

2026-05-06

·

CVE-2025-8088

CVSS v3.1

8.8

High

VectorAV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Name of the Vulnerable Software and Affected Versions WinRAR versions prior to 7.13
Description A path traversal issue in the Windows version of WinRAR allows attackers to execute arbitrary code by crafting malicious archive files. The flaw occurs because the archive parser fails to sanitize directory traversal sequences in archive entries, enabling files to be written outside the intended extraction path. Attackers can leverage Alternate Data Streams (ADS) to embed malicious files and place them in sensitive locations, such as the Windows Startup folder, to achieve persistence. This issue has been exploited in the wild by various state-sponsored groups and cybercriminals, including Amaranth-Dragon, Sandworm, Gamaredon, and Turla, targeting government, military, and technology sectors in Southeast Asia and Ukraine.
Recommendations Update to version 7.13 or later. As a temporary workaround, consider disabling WinRAR integration with Windows Explorer. Restrict execution of WinRAR.exe via Group Policy where not required. Quarantine .rar, .zip, and .7z attachments from external sources.

Fix

RCE

Weakness Enumeration

Related Identifiers

BDU:2025-09597
CVE-2025-8088

Affected Products

Winrar