PT-2025-32352 · Rarlab +1 · Winrar
Anton Cherepanov
+2
·
Published
2025-07-30
·
Updated
2025-08-26
·
CVE-2025-8088
8.8
High
Base vector | Vector | AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H |
**Name of the Vulnerable Software and Affected Versions:**
WinRAR versions prior to 7.13
**Description:**
WinRAR contains a path traversal vulnerability that allows attackers to execute arbitrary code by crafting malicious archive files. This vulnerability has been actively exploited in the wild by multiple threat actors, including the Russia-linked RomCom group and Paper Werewolf. Exploitation involves embedding malicious payloads within RAR archives that, when extracted, place files in unauthorized locations, such as the Windows Startup folder, leading to automatic execution of malicious code. The vulnerability affects Windows versions of WinRAR and applications using the UnRAR library.
**Recommendations:**
Update WinRAR to version 7.13 or later to address this vulnerability.
Fix
RCE
Weakness Enumeration
Related Identifiers
Affected Products
References · 242
- https://bdu.fstec.ru/vul/2025-09597 · Security Note
- https://nvd.nist.gov/vuln/detail/CVE-2025-8088 · Security Note
- https://win-rar.com/singlenewsview.html?&L=0&tx_ttnews%5Btt_news%5D=283&cHash=a64b4a8f662d3639dec8d65f47bc93c5 · Security Note
- https://t.me/cKure/16164 · Telegram Post
- https://twitter.com/fernandokarl/status/1954906136424915091 · Twitter Post
- https://twitter.com/techbrieflycom/status/1955932522828742678 · Twitter Post
- https://t.me/cveNotify/131990 · Telegram Post
- https://win-rar.com/singlenewsview.html?&L=0&tx_ttnews%5Btt_news%5D=283&cHash=a64b4a8f662d3639dec8d65f47bc93c5 · Note
- https://twitter.com/transilienceai/status/1957697153738109408 · Twitter Post
- https://twitter.com/UNSEEN_USN/status/1954851572074029267 · Twitter Post
- https://reddit.com/r/SecOpsDaily/comments/1mlspcq/winrar_zeroday_exploited_to_plant_malware_on · Reddit Post
- https://twitter.com/rapidriskradar/status/1956004676547100804 · Twitter Post
- https://twitter.com/HarborcoatIntel/status/1954890829903827129 · Twitter Post
- https://t.me/CSIRT_italia/2640 · Telegram Post
- https://twitter.com/UndercodeNews/status/1955310809103372577 · Twitter Post