A critical security vulnerability has been discovered in RARLAB’s popular WinRAR archiving software that allows remote attackers to execute arbitrary code on affected systems through directory traversal exploitation.
The vulnerability, designated as CVE-2025-6218 with a CVSS score of 7.8, affects WinRAR installations and requires user interaction to be successfully exploited, typically through opening malicious archive files or visiting compromised web pages.
The vulnerability, identified as ZDI-25-409 and tracked under ZDI-CAN-27198, stems from improper handling of file paths within archive files processed by WinRAR.
Security researchers have determined that specially crafted file paths embedded within malicious archives can cause the application to traverse to unintended directories during extraction operations.
This directory traversal weakness creates a pathway for attackers to place malicious executable files in critical system locations, ultimately enabling code execution within the security context of the current user.
The attack vector requires social engineering components, as potential victims must be tricked into opening malicious archive files or visiting compromised websites hosting such files.
Once the malicious archive is processed by WinRAR, the crafted file paths exploit the directory traversal vulnerability to bypass intended extraction boundaries.
This mechanism allows attackers to write files to arbitrary locations on the target system, potentially overwriting critical system files or placing malware in startup directories.
RARLAB responded promptly to the vulnerability disclosure, following a responsible disclosure process with key milestones:
The discovery of this directory traversal vulnerability highlights ongoing security challenges in file archiving software, particularly regarding the validation of file paths during extraction operations.
With a CVSS score of 7.8, classified as “High” severity, this vulnerability poses significant risks to organizations and individual users who regularly handle archive files from untrusted sources.
Security experts recommend immediate updating to the latest WinRAR version as the primary mitigation strategy.
Additionally, users should exercise caution when handling archive files from unknown sources, implementing additional security layers such as antivirus scanning and sandboxing environments for processing potentially suspicious files.
Organizations should prioritize this update in their patch management cycles, given WinRAR’s widespread deployment in enterprise environments.
The vulnerability serves as a reminder of the importance of input validation in file processing applications and the potential security risks associated with seemingly benign file operations like archive extraction.
Find this Story Interesting! Follow us on LinkedIn and X to Get More Instant Updates.
PortSwigger has leveled up Burp Suite's scanning arsenal with the latest Active Scan++ extension, version…
Unit 42 researchers at Palo Alto Networks exposed serious flaws in the Model Context Protocol…
Polish police have arrested three Ukrainian men traveling through Europe and seized a cache of…
Google has launched its most significant Chrome update ever, embedding Gemini AI across the browser…
Attackers exploit this vulnerability through the router's web interface components, specifically "cgibin" and "hnap_main," by…
Security researchers have uncovered a severe flaw in Apache Tika, a popular open-source toolkit for…