A severe directory traversal vulnerability (CVE-2025-6218) in RARLAB’s WinRAR software enables remote code execution (RCE) by exploiting archive extraction processes.
Rated CVSS 7.8 (High), this flaw affects Windows versions of WinRAR, RAR, UnRAR, UnRAR.dll, and portable UnRAR source code, while Unix and Android versions remain unaffected.
Attackers can compromise systems by tricking users into opening malicious archives containing crafted file paths with directory traversal sequences (e.g., ../).
Successful exploitation allows arbitrary code execution in the victim’s security context, risking complete system compromise.
The vulnerability stems from inadequate sanitization of file paths during archive extraction.
When processing a maliciously crafted archive, WinRAR fails to validate path names, permitting directory traversal beyond the intended extraction directory.
This allows attackers to:
Exploitation requires user interaction, typically achieved through phishing emails, malicious websites, or disguised archive downloads.
The attack vector is local (AV:L), but remote attackers leverage the internet to deliver malicious archives.
RARLAB addressed the vulnerability in WinRAR version 7.12 Beta 1 released on June 10, 2025. Users must immediately update to this version to prevent exploitation.
Key mitigation strategies include:
The flaw was discovered by researcher “whs3-detonator” and reported through Trend Micro’s Zero Day Initiative (ZDI) on June 5, 2025.
Coordinated public disclosure occurred on June 19, 2025.
Despite the patch availability, unpatched systems remain vulnerable to low-complexity attacks requiring minimal user interaction.
Security analysts note that:
Organizations should conduct vulnerability scans for WinRAR versions 7.00 beta 1 through 7.10 and enforce update policies.
Cybersecurity authorities recommend treating this vulnerability as high-priority due to its RCE potential and attack simplicity.
Find this Story Interesting! Follow us on LinkedIn and X to Get More Instant updates
The post WinRAR Directory Vulnerability Allows Execution of Arbitrary Code via Malicious File appeared first on Cyber Security News.
Resident Evil director Zach Cregger has seen the calls for his movie to stick closer…
Workday has beaten analyst expectations in its first quarter results for Fiscal 2027. Revenue rose…
Epicor is holding its Insights conference this week in Nashville. With around 4,000 attendees, it…
Before exploitation film legend Jesús Franco Manera – usually known as Jess Franco – met…
A newly disclosed flaw in one of the world’s most widely deployed web servers is…
Written by Jenae Barnes, The 19th This story was originally reported by The 19th. As…
This website uses cookies.