PT-2025-32352 · Rarlab +1 · Winrar
Anton Cherepanov
+2
·
Published
2025-07-30
·
Updated
2025-10-31
·
CVE-2025-8088
CVSS v3.1
8.8
  8.8
High
| Base vector | Vector | AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H | 
Name of the Vulnerable Software and Affected Versions
WinRAR versions prior to 7.13
Description
A path traversal vulnerability exists in the Windows version of WinRAR, allowing attackers to execute arbitrary code by crafting malicious archive files. This vulnerability has been actively exploited in the wild by threat actors, including the Russia-linked RomCom group and Paper Werewolf. Exploitation involves embedding malicious payloads within RAR archives, which, when extracted, can place files in unauthorized locations, such as the Windows Startup folder, leading to automatic execution of malicious code upon system startup. The vulnerability leverages alternate data streams (ADS) to hide malicious content within the archive. The vulnerability was exploited in phishing campaigns targeting organizations in Europe and Canada, including those in the finance, manufacturing, defense, and logistics sectors.
Recommendations
Update WinRAR to version 7.13 or later. As there is no automatic update feature, a manual update is required.
Fix
RCE
 Found an issue in the description?  Have something to add?  Feel free to write us 👾 
dbugs@ptsecurity.com
Weakness Enumeration
Related Identifiers
BDU:2025-09597
CVE-2025-8088
Affected Products
Winrar
References · 317
- https://nvd.nist.gov/vuln/detail/CVE-2025-8088 · Security Note
- https://bdu.fstec.ru/vul/2025-09597 · Security Note
- https://win-rar.com/singlenewsview.html?&L=0&tx_ttnews%5Btt_news%5D=283&cHash=a64b4a8f662d3639dec8d65f47bc93c5 · Security Note
- https://twitter.com/Hackercool_mag/status/1966192610382426606 · Twitter Post
- https://reddit.com/r/AlphaHuntIntel/comments/1moaoxz/romcoms_idea_of_a_meetcute_sneaking_a · Reddit Post
- https://reddit.com/r/CVEWatch/comments/1n6fh7b/top_10_trending_cves_02092025 · Reddit Post
- https://twitter.com/ESETresearch/status/1971564401724670158 · Twitter Post
- https://twitter.com/fernandokarl/status/1954906136424915091 · Twitter Post
- https://reddit.com/r/SecOpsDaily/comments/1mnlw7p/details_emerge_on_winrar_zeroday_attacks_that · Reddit Post
- https://twitter.com/blackorbird/status/1955190716289937461 · Twitter Post
- https://twitter.com/SPSDigitalTech/status/1955364379299287438 · Twitter Post
- https://twitter.com/transilienceai/status/1958405323783336043 · Twitter Post
- https://twitter.com/TheHackersNews/status/1954783917908660554 · Twitter Post
- https://twitter.com/NRG_fx/status/1954247947224322247 · Twitter Post
- https://twitter.com/LeVPN/status/1954938345395519969 · Twitter Post