CVE-2025-8088
WinRAR vulnerability analysis and mitigation

Overview

A path traversal vulnerability (CVE-2025-8088) affecting the Windows version of WinRAR was discovered by ESET researchers on July 18th, 2025. The vulnerability allows attackers to execute arbitrary code by crafting malicious archive files using alternate data streams (ADSes) for path traversal. The flaw affects WinRAR (Windows), RAR and UnRAR (Windows), UnRAR.dll, and portable UnRAR (Windows) versions up to 7.12. After notification from ESET researchers, WinRAR released version 7.13 with patches on July 30th, 2025 (ESET Research, WinRAR News).

Technical details

The vulnerability exploits alternate data streams (ADSes) for path traversal, allowing attackers to craft archives that appear to contain only benign files while hiding malicious ADSes. When a victim opens the archive, WinRAR unpacks it along with all its hidden ADSes, deploying malicious files to sensitive locations like %TEMP% and the Windows startup directory. The attackers used multiple ADSes with increasing depths of parent directory relative path elements to ensure successful exploitation. The CVSS v3.1 base score is 8.8 (HIGH) with vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H (ESET Research).

Impact

The vulnerability allows attackers to silently deploy malicious files when extracting seemingly benign archives, potentially leading to arbitrary code execution. The exploit was used in targeted attacks against financial, manufacturing, defense, and logistics companies in Europe and Canada. Successful exploitation could result in the deployment of various backdoors including SnipBot variant, RustyClaw, and Mythic agent, enabling attackers to execute commands and download additional malicious modules (ESET Research).

Mitigation and workarounds

Users of WinRAR and affected components should immediately upgrade to WinRAR version 7.13 or later. This includes users of Windows versions of command line utilities, UnRAR.dll, and the portable UnRAR source code. Software solutions relying on publicly available Windows versions of UnRAR.dll or its corresponding source code should update their dependencies. Other platforms including Linux/Unix builds and RAR for Android are not affected (WinRAR News).

Community reactions

The discovery highlighted RomCom's increasing sophistication and willingness to invest in zero-day vulnerabilities for targeted attacks. This marks the third time RomCom has been caught exploiting significant zero-day vulnerabilities in the wild. The WinRAR team was praised for their quick response, releasing a patch within one day of notification (ESET Research).

Additional resources


SourceThis report was generated using AI

Related WinRAR vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-8088HIGH8.4
  • WinRARWinRAR
  • cpe:2.3:a:rarlab:winrar
YesYesAug 08, 2025
CVE-2014-125119HIGH8.4
  • WinRARWinRAR
  • cpe:2.3:a:rarlab:winrar
NoYesJul 25, 2025
CVE-2025-6218HIGH7.8
  • WinRARWinRAR
  • cpe:2.3:a:rarlab:winrar
NoYesJun 21, 2025
CVE-2024-36052HIGH7.5
  • WinRARWinRAR
  • cpe:2.3:a:rarlab:winrar
NoYesMay 21, 2024
CVE-2025-31334MEDIUM6.8
  • WinRARWinRAR
  • cpe:2.3:a:rarlab:winrar
NoYesApr 03, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management