Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
New Zip Slip Vulnerability Allows Attackers to Manipulate ZIP Files During Decompression

New Zip Slip Vulnerability Allows Attackers to Manipulate ZIP Files During Decompression

Posted on August 27, 2025August 27, 2025 By CWS

A newly noticed variant of the Zip Slip vulnerability has emerged, enabling risk actors to take advantage of path traversal flaws in extensively used decompression utilities.

Exploits leveraging this vulnerability craft malicious archives containing specifically constructed file names with relative paths.

When an unsuspecting consumer or automated system extracts these archives, recordsdata are written outdoors the supposed extraction listing, probably overwriting crucial system or utility binaries.

Early experiences point out that attackers are weaponizing this system to implant backdoors and escalate privileges on each Home windows and Unix targets.

In contrast to conventional archives that prohibit file areas to a subfolder, the malicious ZIP recordsdata comprise entries.

Upon decompression, these entries bypass insufficient path sanitization and deposit payloads instantly into system directories.

Preliminary incidents have been noticed in inner penetration assessments, however extra subtle campaigns lately attributed to the RomCom APT group have demonstrated live-fire exploitation in enterprise environments.

ASEC analysts recognized that the variant takes benefit of the final goal bit flag within the ZIP header to encode path separators that evade detection by signature-based scanners.

In a single case, a compromised e-mail attachment delivered a ZIP archive that, when opened with an outdated decompression device, silently overwrote a legit startup script.

Examination of the archive construction reveals that the filename subject starting at offset 0x1E accommodates path segments separated by percent-encoded slashes, that are decoded solely throughout file creation.

ZIP file containing the trail to the unzipped file (Supply – ASEC)

Subsequent reverse engineering uncovered that the malicious archive leveraged Python’s zipfile module to insert relative paths instantly into the filename subject.

Main vulnerabilities exploited by this system embody:-

CVE-2025-8088 – It impacts WinRAR previous to model 7.13 and permits bypass of path validation by way of Alternate Knowledge Stream traversal.

CVE-2025-6218 – A distant code execution flaw in WinRAR variations earlier than 7.12 that sidesteps relative path filters when areas are used.

CVE-2022-30333 – It targets RARLAB Unrar earlier than 6.12 to overwrite SSH authorized_keys by way of “../../instance” paths.

CVE-2018-20250 – This abuses ACE format extraction in WinRAR pre-5.61 by bypassing UNACEV2.dll filtering logic.

Along with easy file overwrite, this variant helps embedding executable scripts and DLLs designed to take care of persistence.

By writing payloads to startup folders or systemd service directories, attackers guarantee execution upon reboot. Detection is difficult by the truth that many decompression utilities don’t normalize or validate canonical paths earlier than writing.

Cybersecurity groups are suggested to make use of decompression libraries with built-in path traversal checks, implement extraction inside sandboxed environments, and replace instruments to patched variations launched after August 2025 that embody strict listing validation routines.

Enhance your SOC and assist your group defend your online business with free top-notch risk intelligence: Request TI Lookup Premium Trial.

Cyber Security News Tags:Attackers, Decompression, Files, Manipulate, Slip, Vulnerability, ZIP

Post navigation

Previous Post: ShadowSilk Hits 36 Government Targets in Central Asia and APAC Using Telegram Bots
Next Post: Anthropic Disrupts AI-Powered Cyberattacks Automating Theft and Extortion Across Critical Sectors

Related Posts

DuckDuckGo Rolls Out New Scam Blocker to Protect Users from Online Threats DuckDuckGo Rolls Out New Scam Blocker to Protect Users from Online Threats Cyber Security News
Microsoft Investigating Teams and Exchange Online Services Disruption Impacting Users Microsoft Investigating Teams and Exchange Online Services Disruption Impacting Users Cyber Security News
VMware NSX XSS Vulnerability Allows Attackers to Inject Malicious Code VMware NSX XSS Vulnerability Allows Attackers to Inject Malicious Code Cyber Security News
Nike Investigates Data Breach Following WorldLeaks Ransomware Group Claim Nike Investigates Data Breach Following WorldLeaks Ransomware Group Claim Cyber Security News
Open-Source Tool for Salesforce Aura Framework Misconfiguration Analysis Open-Source Tool for Salesforce Aura Framework Misconfiguration Analysis Cyber Security News
Microsoft Office Vulnerabilities Let Attackers Execute Remote Code Microsoft Office Vulnerabilities Let Attackers Execute Remote Code Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News