PT-2025-32352 · Rarlab +1 · Winrar
Anton Cherepanov
+2
·
Published
2025-07-30
·
Updated
2026-01-24
·
CVE-2025-8088
CVSS v3.1
8.8
8.8
High
| Base vector | Vector | AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H |
Name of the Vulnerable Software and Affected Versions
WinRAR versions prior to 7.13
WinRAR versions 5.50 through 7.12
Description
WinRAR contains a path traversal vulnerability affecting the Windows version of the software. This vulnerability allows attackers to execute arbitrary code by crafting malicious archive files. The vulnerability has been actively exploited in the wild by multiple threat actors, including RomCom and Paper Werewolf, through phishing campaigns. Attackers can embed malicious payloads within RAR archives, which, when extracted, place files in unauthorized locations, such as the Windows Startup folder, leading to automatic execution of malicious code upon system startup. Alternate Data Streams (ADS) are used to hide malicious payloads within the archives. This vulnerability is tracked as CVE-2025-8088.
Recommendations
Update WinRAR to version 7.13 or later.
Fix
RCE
Found an issue in the description? Have something to add? Feel free to write us 👾
dbugs@ptsecurity.com
Weakness Enumeration
Related Identifiers
BDU:2025-09597
CVE-2025-8088
Affected Products
Winrar
References · 362
- https://win-rar.com/singlenewsview.html?&L=0&tx_ttnews%5Btt_news%5D=283&cHash=a64b4a8f662d3639dec8d65f47bc93c5 · Security Note
- https://nvd.nist.gov/vuln/detail/CVE-2025-8088 · Security Note
- https://bdu.fstec.ru/vul/2025-09597 · Security Note
- https://github.com/bartblaze/Yara-rules⭐ 373 🔗 57 · Note
- https://welivesecurity.com/en/eset-research/update-winrar-tools-now-romcom-and-others-exploiting-zero-day-vulnerability/#the-discovery-of-cve-2025-8088 · Note
- https://reddit.com/r/CVEWatch/comments/1pafq0u/top_10_trending_cves_30112025 · Reddit Post
- https://twitter.com/blackorbird/status/1955147108572385466 · Twitter Post
- https://twitter.com/SecurityAid/status/1988851007174971875 · Twitter Post
- https://reddit.com/r/CVEWatch/comments/1msmzzs/top_10_trending_cves_17082025 · Reddit Post
- https://twitter.com/ScyScan/status/1955451873118523548 · Twitter Post
- https://twitter.com/transilienceai/status/1954424368362082811 · Twitter Post
- https://twitter.com/NetizenCorp/status/1954922830929203692 · Twitter Post
- https://twitter.com/alphahunt_io/status/1961452793627107468 · Twitter Post
- https://twitter.com/Cekbe8/status/1955360169971642717 · Twitter Post
- https://t.me/avleonovcom/1581 · Telegram Post