PT-2025-32352 · Rarlab +1 · Winrar
Anton Cherepanov
+2
·
Published
2025-07-30
·
Updated
2026-02-17
·
CVE-2025-8088
CVSS v3.1
8.8
8.8
High
| Base vector | Vector | AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H |
Name of the Vulnerable Software and Affected Versions
WinRAR versions prior to 7.13
Description
WinRAR is vulnerable to a critical path traversal flaw (CVE-2025-8088) that allows attackers to execute arbitrary code by crafting malicious archive files. This vulnerability has been actively exploited in the wild by multiple threat actors, including Russia-linked groups (RomCom, Paper Werewolf) and China-linked actors (Amaranth-Dragon, APT41). Attackers leverage this flaw by embedding malicious payloads within Alternate Data Streams (ADS) of RAR archives, which, when extracted, can lead to the execution of code in the Windows Startup folder or other system locations. The exploitation has been observed in phishing campaigns and is used to deploy malware such as SnipBot, RustyClaw, Mythic Agent, and TGAmaranth RAT. The vulnerability allows attackers to bypass security measures and gain persistent access to compromised systems. The flaw is a path traversal vulnerability that allows attackers to write files outside the intended extraction path.
Recommendations
Update WinRAR to version 7.13 or later immediately.
Fix
RCE
Found an issue in the description? Have something to add? Feel free to write us 👾
dbugs@ptsecurity.com
Weakness Enumeration
Related Identifiers
BDU:2025-09597
CVE-2025-8088
Affected Products
Winrar
References · 547
- https://bdu.fstec.ru/vul/2025-09597 · Security Note
- https://nvd.nist.gov/vuln/detail/CVE-2025-8088 · Security Note
- https://win-rar.com/singlenewsview.html?&L=0&tx_ttnews%5Btt_news%5D=283&cHash=a64b4a8f662d3639dec8d65f47bc93c5 · Security Note
- https://github.com/bartblaze/Yara-rules⭐ 373 🔗 57 · Note
- https://reddit.com/r/DattoRMM/comments/1moy18n/winrar_actively_exploited_patch_now · Reddit Post
- https://reddit.com/r/CVEWatch/comments/1n861wj/top_10_trending_cves_04092025 · Reddit Post
- https://reddit.com/r/SABnzbd/comments/1mzra02/release_notes_sabnzbd_453 · Reddit Post
- https://twitter.com/jackgoesvirtual/status/2016664425101402452 · Twitter Post
- https://twitter.com/samilaiho/status/1955730271824908552 · Twitter Post
- https://twitter.com/KillerFungi2022/status/2005039342902018427 · Twitter Post
- https://twitter.com/securityRSS/status/2016467356579422239 · Twitter Post
- https://twitter.com/UndercodeUpdate/status/2019173755486921079 · Twitter Post
- https://twitter.com/dailytechonx/status/2016937896242999362 · Twitter Post
- https://reddit.com/r/SecOpsDaily/comments/1mngywy/new_winrar_zeroday_exploited_by_romcom_hackers · Reddit Post
- https://twitter.com/smica83/status/1988501440373850372 · Twitter Post