CVSS Vector
CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Lifecycle Timeline
6Tags
Description
RARLAB WinRAR Directory Traversal Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of RARLAB WinRAR. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of file paths within archive files. A crafted file path can cause the process to traverse to unintended directories. An attacker can leverage this vulnerability to execute code in the context of the current user. Was ZDI-CAN-27198.
Analysis
WinRAR contains a directory traversal vulnerability (CVE-2025-6218, CVSS 7.8) enabling remote code execution when users extract crafted archives. KEV-listed with EPSS 4.7% and public PoC, this vulnerability allows archive files to write outside the extraction directory, placing malicious files in startup folders or other sensitive locations. Given WinRAR's 500+ million user base, this is a high-impact social engineering vector.
Technical Context
The vulnerability in WinRAR's archive extraction logic allows path traversal sequences in filenames within the archive. When a user extracts the archive, files can be written to arbitrary locations on the filesystem instead of the intended extraction directory. Attackers typically target the Windows Startup folder (for persistence) or overwrite system files. This is reminiscent of CVE-2018-20250 (the ACE format traversal in WinRAR) which was also KEV-listed and widely exploited.
Affected Products
['RARLAB WinRAR (versions prior to security update)']
Remediation
Update WinRAR immediately. If unable to update, exercise extreme caution with archive files from untrusted sources. Enterprise: deploy WinRAR updates via software management. Consider blocking RAR attachments at email gateways.
Priority Score
Vendor Status
Debian
| Release | Status | Fixed Version | Urgency |
|---|---|---|---|
| bullseye/non-free | fixed | 2:6.23-1~deb11u1 | - |
| bookworm/non-free | fixed | 2:7.01-1~deb12u1 | - |
| trixie/non-free | fixed | 2:7.11-1 | - |
| forky/non-free, sid/non-free | fixed | 2:7.20-1 | - |
| (unstable) | not-affected | - | - |
Share
External POC / Exploit Code
Leaving vuln.today
EUVD-2025-28706