A zero-day vulnerability tracked as CVE-2025-8088 was discovered in WinRAR, affecting the Windows version and potentially leading to arbitrary code execution through specially crafted archive files. The vulnerability, which has a CVSS score of 8.8, was reported by security researchers Anton Cherepanov, Peter Kosinar, and Peter Strycek from ESET and patched in version 7.13 released on July 31, 2025. Concerns arise as previous attacks exploited WinRAR vulnerabilities, with evidence suggesting that the Paper Werewolf hacking group may have used this exploit in attacks alongside other reported security flaws.
When extracting a file, previous versions of WinRAR, Windows versions of RAR, UnRAR, portable UnRAR source code and UnRAR.dll can be tricked into using a path, defined in a specially crafted archive, instead of a specified path.
It's important to note that prior to these attacks, a threat actor identified as "zeroplayer" was spotted advertising on July 7, 2025, an alleged WinRAR zero-day exploit on the Russian-language dark web forum Exploit.in for a price tag of $80,000.
Collection
[
|
...
]