PT-2025-26225 · Winrar · Winrar
Marcin Bobryk
·
Published
2025-06-19
·
Updated
2025-12-10
·
CVE-2025-6218
CVSS v3.1
7.8
7.8
High
| Base vector | Vector | AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H |
Name of the Vulnerable Software and Affected Versions
WinRAR versions prior to 7.12
Description
WinRAR contains a directory traversal vulnerability that allows remote attackers to execute arbitrary code. The vulnerability stems from improper handling of file paths within archive files, enabling a crafted file path to traverse to unintended directories, potentially including system folders. Exploitation requires user interaction, such as opening a malicious file or visiting a malicious page. Attackers can leverage this flaw to execute code in the context of the current user. The vulnerability has been actively exploited by threat actors, including the Paper Werewolf group targeting Russian organizations and the Gamaredon APT group in attacks against Ukrainian targets. A zero-day exploit was also reportedly sold on the dark web. The vulnerability allows attackers to manipulate archive paths, potentially writing to protected system folders. Approximately 500 million users worldwide may be affected.
Recommendations
Update WinRAR to version 7.12 or later.
Exploit
Fix
RCE
Path traversal
Found an issue in the description? Have something to add? Feel free to write us 👾
dbugs@ptsecurity.com
Weakness Enumeration
Related Identifiers
BDU:2025-07480
CVE-2025-6218
ZDI-25-409
Affected Products
Winrar
References · 118
- 🔥 https://github.com/speinador/CVE-2025-6218_WinRAR⭐ 14 🔗 4 · Exploit
- https://win-rar.com/singlenewsview.html?&tx_ttnews%5Btt_news%5D=276&cHash=388885bd3908a40726f535c026f94eb6 · Vendor Advisory
- https://bdu.fstec.ru/vul/2025-07480 · Security Note
- https://safe-surf.ru/specialists/bulletins-nkcki/722058 · Security Note
- https://win-rar.com/singlenewsview.html?&L=0&tx_ttnews%5Btt_news%5D=276&cHash=b5165454d983fc9717bc8748901a64f9 · Security Note
- https://nvd.nist.gov/vuln/detail/CVE-2025-6218 · Security Note
- https://zerodayinitiative.com/advisories/ZDI-25-409 · Security Note
- https://reddit.com/r/CVEWatch/comments/1osgn6m/top_10_trending_cves_09112025 · Reddit Post
- https://twitter.com/piedpiper1616/status/1938499346720498071 · Twitter Post
- https://reddit.com/r/CVEWatch/comments/1ph9nrz/top_10_trending_cves_08122025 · Reddit Post
- https://twitter.com/threatlight/status/1937937939515785444 · Twitter Post
- https://twitter.com/smica83/status/1988216754355732895 · Twitter Post
- https://twitter.com/ochsenmeier/status/1988250666339307951 · Twitter Post
- https://twitter.com/dCypherIO/status/1937480825693463006 · Twitter Post
- https://twitter.com/Cyber_O51NT/status/1960139742336426228 · Twitter Post