PT-2025-32352 · Rarlab +1 · Winrar
Anton Cherepanov
+2
·
Published
2025-07-30
·
Updated
2025-10-22
·
CVE-2025-8088
CVSS v3.1
8.8
8.8
High
Base vector | Vector | AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H |
Name of the Vulnerable Software and Affected Versions
WinRAR versions prior to 7.13
Description
A path traversal vulnerability exists in the Windows version of WinRAR, allowing attackers to execute arbitrary code by crafting malicious archive files. This vulnerability has been actively exploited in the wild by threat actors, including the RomCom and Paper Werewolf groups. Exploitation involves crafting RAR archives that, when extracted, place malicious payloads into system startup folders, leading to automatic execution of malicious code upon system login. The vulnerability allows attackers to bypass security measures and install backdoors for full system access. The vulnerability was discovered by Anton Cherepanov, Peter Košinár, and Peter Strýček from ESET.
Recommendations
Update WinRAR to version 7.13 or later. As WinRAR does not have an auto-update feature, a manual update is required.
Fix
RCE
Found an issue in the description? Have something to add? Feel free to write us 👾
dbugs@ptsecurity.com
Weakness Enumeration
Related Identifiers
BDU:2025-09597
CVE-2025-8088
Affected Products
Winrar
References · 305
- https://bdu.fstec.ru/vul/2025-09597 · Security Note
- https://win-rar.com/singlenewsview.html?&L=0&tx_ttnews%5Btt_news%5D=283&cHash=a64b4a8f662d3639dec8d65f47bc93c5 · Security Note
- https://nvd.nist.gov/vuln/detail/CVE-2025-8088 · Security Note
- https://twitter.com/FloweryDragon_/status/1955758471972004143 · Twitter Post
- https://twitter.com/leonov_av/status/1962907250911047703 · Twitter Post
- https://t.me/aptreports/21168 · Telegram Post
- https://reddit.com/r/CVEWatch/comments/1n861wj/top_10_trending_cves_04092025 · Reddit Post
- https://reddit.com/r/SecOpsDaily/comments/1mn648g/winrar_zeroday_under_active_exploitation_update · Reddit Post
- https://twitter.com/tomshardware/status/1954519093987737986 · Twitter Post
- https://twitter.com/transilienceai/status/1956956581523767527 · Twitter Post
- https://twitter.com/DarkWebInformer/status/1980347626810929225 · Twitter Post
- https://twitter.com/proficioinc/status/1955947509857304637 · Twitter Post
- https://reddit.com/r/SecOpsDaily/comments/1mngywy/new_winrar_zeroday_exploited_by_romcom_hackers · Reddit Post
- https://twitter.com/Cyber_O51NT/status/1973926878093214158 · Twitter Post
- https://twitter.com/samilaiho/status/1956785617632690208 · Twitter Post