
Cloud Vulnerability DB
An open project to list all known cloud vulnerabilities and Cloud Service Provider security issues
A vulnerability tracked as CVE-2025-31334 affects WinRAR versions prior to 7.11, a widely used file compression tool with over 500 million users worldwide. The flaw allows attackers to bypass Windows' Mark of the Web (MotW) security warning function when opening a symbolic link that points to an executable file. This vulnerability was discovered by Taihei Shimamine of Mitsui Bussan Secure Directions and was reported through the Information Technology Promotion Agency (IPA) in Japan (JPCERT, Help Net Security).
The vulnerability stems from how WinRAR processes symbolic links (symlinks) that point to executable files. When a symlink pointing to an executable is started from the WinRAR shell, the executable's Mark of the Web data is ignored, effectively bypassing the security warning mechanism. The flaw has been assigned a CVSS v3.0 base score of 6.8 (Medium) with a vector string of CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H. It is classified as CWE-356 (Product UI does not Warn User of Unsafe Actions) (NVD, Security Online).
If successfully exploited, the vulnerability could allow attackers to execute arbitrary code on the target system without triggering the usual Windows security warnings. This could lead to malware installation, sensitive data theft, unauthorized remote access, and potential system damage. The impact is particularly significant given WinRAR's extensive user base of over 500 million users worldwide (Bleeping Computer, Security Online).
The vulnerability has been fixed in WinRAR version 7.11. Users are strongly advised to update to this latest version immediately. Since WinRAR does not include auto-update functionality, users must manually download and install the update from the official website. No alternative workarounds have been published (Help Net Security, WinRAR).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
An open project to list all known cloud vulnerabilities and Cloud Service Provider security issues
A comprehensive threat intelligence database of cloud security incidents, actors, tools and techniques
A step-by-step framework for modeling and improving SaaS and PaaS tenant isolation
Get a personalized demo
“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
“We know that if Wiz identifies something as critical, it actually is.”