EUVD-2025-28706

| CVE-2025-6218 HIGH
2025-06-21 [email protected]
7.8
CVSS 3.0
Share

CVSS Vector

CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Attack Vector
Local
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Lifecycle Timeline

6
Patch Released
Mar 31, 2026 - 21:13 nvd
Patch available
Analysis Generated
Mar 15, 2026 - 21:35 vuln.today
EUVD ID Assigned
Mar 15, 2026 - 21:35 euvd
EUVD-2025-28706
Added to CISA KEV
Dec 10, 2025 - 13:48 cisa
CISA KEV
PoC Detected
Dec 10, 2025 - 13:48 vuln.today
Public exploit code
CVE Published
Jun 21, 2025 - 01:15 nvd
HIGH 7.8

Description

RARLAB WinRAR Directory Traversal Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of RARLAB WinRAR. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of file paths within archive files. A crafted file path can cause the process to traverse to unintended directories. An attacker can leverage this vulnerability to execute code in the context of the current user. Was ZDI-CAN-27198.

Analysis

WinRAR contains a directory traversal vulnerability (CVE-2025-6218, CVSS 7.8) enabling remote code execution when users extract crafted archives. KEV-listed with EPSS 4.7% and public PoC, this vulnerability allows archive files to write outside the extraction directory, placing malicious files in startup folders or other sensitive locations. Given WinRAR's 500+ million user base, this is a high-impact social engineering vector.

Technical Context

The vulnerability in WinRAR's archive extraction logic allows path traversal sequences in filenames within the archive. When a user extracts the archive, files can be written to arbitrary locations on the filesystem instead of the intended extraction directory. Attackers typically target the Windows Startup folder (for persistence) or overwrite system files. This is reminiscent of CVE-2018-20250 (the ACE format traversal in WinRAR) which was also KEV-listed and widely exploited.

Affected Products

['RARLAB WinRAR (versions prior to security update)']

Remediation

Update WinRAR immediately. If unable to update, exercise extreme caution with archive files from untrusted sources. Enterprise: deploy WinRAR updates via software management. Consider blocking RAR attachments at email gateways.

Priority Score

114
Low Medium High Critical
KEV: +50
EPSS: +4.7
CVSS: +39
POC: +20

Vendor Status

Debian

rar
Release Status Fixed Version Urgency
bullseye/non-free fixed 2:6.23-1~deb11u1 -
bookworm/non-free fixed 2:7.01-1~deb12u1 -
trixie/non-free fixed 2:7.11-1 -
forky/non-free, sid/non-free fixed 2:7.20-1 -
(unstable) not-affected - -

Share

EUVD-2025-28706 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy