PT-2025-32352 · Rarlab +1 · Winrar
Anton Cherepanov
+2
·
Published
2025-07-30
·
Updated
2026-01-31
·
CVE-2025-8088
CVSS v3.1
8.8
8.8
High
| Base vector | Vector | AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H |
Name of the Vulnerable Software and Affected Versions
WinRAR versions prior to 7.13
Description
WinRAR contains a path traversal vulnerability that allows attackers to execute arbitrary code by crafting malicious archive files. This vulnerability has been actively exploited in the wild by multiple threat actors, including Russia-linked groups (RomCom, Paper Werewolf, Gamaredon) and China-linked actors. Attackers exploit this flaw by embedding malicious payloads within RAR archives, which, when opened, can place files in sensitive system locations like the Startup folder, leading to automatic malware execution upon system login. The vulnerability allows attackers to bypass security measures and deploy various malware, including SnipBot, RustyClaw, Mythic Agent, and PoisonIvy. The vulnerability is tracked as CVE-2025-8088 and was addressed in WinRAR version 7.13. The exploitation of this vulnerability has been observed in phishing campaigns targeting various sectors, including finance, defense, manufacturing, and logistics.
Recommendations
Update to WinRAR version 7.13 or later.
Fix
RCE
Found an issue in the description? Have something to add? Feel free to write us 👾
dbugs@ptsecurity.com
Weakness Enumeration
Related Identifiers
BDU:2025-09597
CVE-2025-8088
Affected Products
Winrar
References · 472
- https://bdu.fstec.ru/vul/2025-09597 · Security Note
- https://nvd.nist.gov/vuln/detail/CVE-2025-8088 · Security Note
- https://win-rar.com/singlenewsview.html?&L=0&tx_ttnews%5Btt_news%5D=283&cHash=a64b4a8f662d3639dec8d65f47bc93c5 · Security Note
- https://github.com/bartblaze/Yara-rules⭐ 373 🔗 57 · Note
- https://twitter.com/ScyScan/status/2016474705033822561 · Twitter Post
- https://twitter.com/KillerFungi2022/status/2005039342902018427 · Twitter Post
- https://twitter.com/DarkWebInformer/status/1980347626810929225 · Twitter Post
- https://twitter.com/blueteamsec1/status/2008338272926527719 · Twitter Post
- https://twitter.com/transilienceai/status/1958405323783336043 · Twitter Post
- https://twitter.com/fridaysecurity/status/1954697339006063025 · Twitter Post
- https://reddit.com/r/CVEWatch/comments/1mqtevk/top_10_trending_cves_15082025 · Reddit Post
- https://twitter.com/ESETresearch/status/1954831174221656494 · Twitter Post
- https://t.me/aptreports/25355 · Telegram Post
- https://t.me/aptreports/23077 · Telegram Post
- https://twitter.com/TechNadu/status/1955592785995710671 · Twitter Post