Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

2025-8088 – WinRAR 0-Day Path Traversal Vulnerability Exploited to Execute Malware

Posted on August 15, 2025August 15, 2025 By CWS

A zero-day vulnerability in WinRAR permits malware to be deployed on unsuspecting customers’ techniques, highlighting the continuing threats to widespread software program.

Tracked as CVE-2025-8088, this path traversal flaw impacts the Home windows model of the broadly used file archiving instrument, enabling attackers to execute arbitrary code by specifically crafted archives. The vulnerability, found in mid-July 2025, underscores the dangers of delayed patching in an period of refined phishing campaigns.

The difficulty stems from improper dealing with of file paths throughout extraction, permitting malicious archives to position recordsdata in unauthorized areas, comparable to Home windows Startup folders.

By leveraging alternate knowledge streams (ADS), attackers can cover dangerous payloads inside seemingly benign RAR recordsdata, which deploy silently upon extraction.

This system bypasses user-specified paths, probably resulting in distant code execution on the subsequent login. Unix variations of RAR and associated instruments stay unaffected, however Home windows customers of WinRAR variations previous to 7.13 are at excessive threat.

Exploitation has been linked to a minimum of two risk teams. The Russia-aligned RomCom (also referred to as Storm-0978) initiated assaults from July 18 to 21, 2025, focusing on monetary, manufacturing, protection, and logistics sectors in Europe and Canada.

Posing as job candidates, they distributed phishing emails with malicious RAR attachments disguised as resumes, deploying backdoors like SnipBot, RustyClaw, and Mythic brokers for persistence and knowledge exfiltration.

In the meantime, the Paper Werewolf group (aka GOFFEE) exploited the flaw towards Russian organizations, mimicking official communications from a analysis institute. Proof suggests the exploit might have been bought on a darkish internet discussion board for $80,000 in late June 2025, explaining its fast adoption by a number of actors.

WinRAR Zero-Day Path Traversal Exploited

ESET researchers first noticed the zero-day on July 18, 2025, throughout evaluation of a suspicious DLL in a RAR archive. They notified WinRAR builders on July 24, prompting a swift repair in model 7.13, launched on July 30, 2025

The patch addresses the trail traversal mechanism, stopping manipulated extraction paths. This marks RomCom’s third zero-day exploit in recent times, following abuses of CVE-2023-36884 and CVE-2024-49039.

Customers are urged to replace instantly, as WinRAR lacks an auto-update examine for variations through Assist > About WinRAR and obtain from official sources.

Organizations ought to scan for indicators of compromise, comparable to sudden recordsdata in %TEMP% or Startup directories, and improve electronic mail filtering to dam RAR attachments.

This incident highlights the risks of compressed recordsdata in enterprise communications, with CVSS scores ranking the flaw at 8.8 for its excessive affect.

An illustration video circulating on-line illustrates the exploit’s mechanics, although consultants warning towards unverified sources.

As of August 15, 2025, no widespread assaults past focused phishing have been reported, however the vulnerability’s public disclosure might encourage copycat campaigns. Vigilance and immediate patching stay key defenses towards such evolving threats.

Increase your SOC and assist your crew shield what you are promoting with free top-notch risk intelligence: Request TI Lookup Premium Trial.

Cyber Security News Tags:0Day, Execute, Exploited, Malware, Path, Traversal, Vulnerability, WinRAR

Post navigation

Previous Post: Cisco Warns of CVSS 10.0 FMC RADIUS Flaw Allowing Remote Code Execution
Next Post: Cisco Patches Critical Vulnerability in Firewall Management Platform

Related Posts

Threat Actors Weaponize LNK Files With New REMCOS Variant That Bypasses AV Engines Cyber Security News
Microsoft Zero Day Quest Hacking Contest Cyber Security News
Predator Mobile Spyware Remains Consistent with New Design Changes to Evade Detection Cyber Security News
Technical Details of SAP 0-Day Exploitation Script Used to Achieve RCE Disclosed Cyber Security News
macOS ‘Sploitlight’ Vulnerability Let Attackers Steal Private Data of Files Bypassing TCC Cyber Security News
GitHub Outage Disrupts Core Services Globally for Users Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Hackers Weaponize Active Directory Federation Services and office.com to Steal Microsoft 365 logins
  • A Free Zero Trust Web Application Firewall for 2026
  • How Businesses Stop Complex Social Engineering Attacks Early
  • GPT-5 Has a Vulnerability: Its Router Can Send You to Older, Less Safe Models
  • Slow and Steady Security: Lessons from the Tortoise and the Hare

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Hackers Weaponize Active Directory Federation Services and office.com to Steal Microsoft 365 logins
  • A Free Zero Trust Web Application Firewall for 2026
  • How Businesses Stop Complex Social Engineering Attacks Early
  • GPT-5 Has a Vulnerability: Its Router Can Send You to Older, Less Safe Models
  • Slow and Steady Security: Lessons from the Tortoise and the Hare

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News