CVE-2025-8088
HIGHCVSS Vector
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Lifecycle Timeline
3Description
A path traversal vulnerability affecting the Windows version of WinRAR allows the attackers to execute arbitrary code by crafting malicious archive files. This vulnerability was exploited in the wild and was discovered by Anton Cherepanov, Peter Košinár, and Peter Strýček from ESET.
Analysis
WinRAR for Windows contains a path traversal vulnerability allowing crafted archives to execute arbitrary code, discovered by ESET and exploited in the wild for targeted attacks.
Technical Context
The CWE-35 path traversal in WinRAR's archive extraction allows crafted archives to place files outside the intended extraction directory, including in executable locations.
Affected Products
['WinRAR for Windows (affected versions)']
Remediation
Update WinRAR immediately. Monitor for suspicious files in startup locations after archive extraction.
Priority Score
Share
External POC / Exploit Code
Leaving vuln.today