CVE Alert: CVE-2025-8088 – win.rar GmbH – WinRAR

CVE-2025-8088

UnknownCISA KEVExploitation active

A path traversal vulnerability affecting the Windows version of WinRAR allows the attackers to execute arbitrary code by crafting malicious archive files. This vulnerability was exploited in the wild and was discovered by Anton Cherepanov, Peter Košinár, and Peter Strýček from ESET.

CVSS v3.1 not provided
Vendor
win.rar GmbH
Product
WinRAR
Versions
0 lte 7.12
CWE
CWE-35, CWE-35 Path traversal
Vector
n a
Published
2025-08-08T11:11:41.842Z
Updated
2025-08-15T15:49:47.629Z

AI Summary Analysis

**Risk verdict**: Critical risk with known exploitation in the wild; treat as priority 1 given active exploitation (KEV) and SSVC indicators.

**Why this matters**: The flaw enables arbitrary code execution on Windows endpoints when a user opens a malicious archive, potentially granting full control of the host. With local access and no privileges required, attackers can establish initial access, perform data theft, or deploy deeper footholds across the organisation.

**Most likely attack path**: An attacker crafts a malicious archive designed to trigger path traversal in WinRAR. The user’s action to open/extract the file enables code execution, exploiting a local attack surface. Lateral movement is plausible after initial foothold if the host remains connected and misconfigurations exist.

**Who is most exposed**: Windows desktops and laptops with WinRAR installed and used to process archives are at highest risk, especially in environments where users routinely open files from email or downloads.

Detection ideas

  • Monitor for WinRAR process launches triggered by opening archives with suspicious path patterns.
  • Look for extraction paths attempting to escape the designated folder (parent directories).
  • Detect unusual file writes outside extraction paths or to protected system areas post-archive.
  • Correlate sudden bursts of code execution or shell activity after archive handling.
  • Flag known exploitation tool signatures or anomalous archive metadata associated with this vulnerability.

Mitigation and prioritisation

  • Patch WinRAR to the latest version; confirm all endpoints are updated (treat as priority 1 due to KEV).
  • Disable or restrict automatic handling of archives from untrusted sources; enforce application whitelisting.
  • Apply sandboxing/EDR detections for archive extraction and post-exploitation activity; block suspicious process trees.
  • Schedule staged deployment and asset tracking; verify patch compliance organisation-wide.
  • Consider user guidance to avoid opening unsolicited archives and implement mail/download filtering improvements.

A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below

To keep up to date follow us on the below channels.