CVE-2025-0411

HIGH
2025-01-25 [email protected]
7.0
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
Attack Vector
Local
Attack Complexity
High
Privileges Required
None
User Interaction
Required
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Lifecycle Timeline

4
Patch Released
Apr 02, 2026 - 20:30 nvd
Patch available
Analysis Generated
Mar 28, 2026 - 18:05 vuln.today
Added to CISA KEV
Oct 27, 2025 - 17:05 cisa
CISA KEV
CVE Published
Jan 25, 2025 - 05:15 nvd
HIGH 7.0

Description

7-Zip Mark-of-the-Web Bypass Vulnerability. This vulnerability allows remote attackers to bypass the Mark-of-the-Web protection mechanism on affected installations of 7-Zip. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of archived files. When extracting files from a crafted archive that bears the Mark-of-the-Web, 7-Zip does not propagate the Mark-of-the-Web to the extracted files. An attacker can leverage this vulnerability to execute arbitrary code in the context of the current user. Was ZDI-CAN-25456.

Analysis

7-Zip contains a Mark-of-the-Web bypass vulnerability allowing attackers to circumvent Windows security warnings when extracting files from malicious archives, exploited in campaigns targeting Ukrainian organizations.

Technical Context

The CWE-693 protection bypass occurs when 7-Zip processes double-archived files (an archive within an archive). The inner archive's files lose their MotW alternate data stream during extraction, causing Windows to treat them as locally-created trusted files.

Affected Products

['7-Zip (versions before the fix)']

Remediation

Update 7-Zip to the latest version. Train users about double-archive attack techniques. Implement application whitelisting to prevent execution of unknown binaries regardless of MotW status.

Priority Score

137
Low Medium High Critical
KEV: +50
EPSS: +52.4
CVSS: +35
POC: 0

Vendor Status

Share

CVE-2025-0411 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy