Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

2025-8088 – WinRAR 0-Day Path Traversal Vulnerability Exploited to Execute Malware

Posted on August 15, 2025August 15, 2025 By CWS

A zero-day vulnerability in WinRAR permits malware to be deployed on unsuspecting customers’ techniques, highlighting the continuing threats to widespread software program.

Tracked as CVE-2025-8088, this path traversal flaw impacts the Home windows model of the broadly used file archiving instrument, enabling attackers to execute arbitrary code by specifically crafted archives. The vulnerability, found in mid-July 2025, underscores the dangers of delayed patching in an period of refined phishing campaigns.

The difficulty stems from improper dealing with of file paths throughout extraction, permitting malicious archives to position recordsdata in unauthorized areas, comparable to Home windows Startup folders.

By leveraging alternate knowledge streams (ADS), attackers can cover dangerous payloads inside seemingly benign RAR recordsdata, which deploy silently upon extraction.

This system bypasses user-specified paths, probably resulting in distant code execution on the subsequent login. Unix variations of RAR and associated instruments stay unaffected, however Home windows customers of WinRAR variations previous to 7.13 are at excessive threat.

Exploitation has been linked to a minimum of two risk teams. The Russia-aligned RomCom (also referred to as Storm-0978) initiated assaults from July 18 to 21, 2025, focusing on monetary, manufacturing, protection, and logistics sectors in Europe and Canada.

Posing as job candidates, they distributed phishing emails with malicious RAR attachments disguised as resumes, deploying backdoors like SnipBot, RustyClaw, and Mythic brokers for persistence and knowledge exfiltration.

In the meantime, the Paper Werewolf group (aka GOFFEE) exploited the flaw towards Russian organizations, mimicking official communications from a analysis institute. Proof suggests the exploit might have been bought on a darkish internet discussion board for $80,000 in late June 2025, explaining its fast adoption by a number of actors.

WinRAR Zero-Day Path Traversal Exploited

ESET researchers first noticed the zero-day on July 18, 2025, throughout evaluation of a suspicious DLL in a RAR archive. They notified WinRAR builders on July 24, prompting a swift repair in model 7.13, launched on July 30, 2025

The patch addresses the trail traversal mechanism, stopping manipulated extraction paths. This marks RomCom’s third zero-day exploit in recent times, following abuses of CVE-2023-36884 and CVE-2024-49039.

Customers are urged to replace instantly, as WinRAR lacks an auto-update examine for variations through Assist > About WinRAR and obtain from official sources.

Organizations ought to scan for indicators of compromise, comparable to sudden recordsdata in %TEMP% or Startup directories, and improve electronic mail filtering to dam RAR attachments.

This incident highlights the risks of compressed recordsdata in enterprise communications, with CVSS scores ranking the flaw at 8.8 for its excessive affect.

An illustration video circulating on-line illustrates the exploit’s mechanics, although consultants warning towards unverified sources.

As of August 15, 2025, no widespread assaults past focused phishing have been reported, however the vulnerability’s public disclosure might encourage copycat campaigns. Vigilance and immediate patching stay key defenses towards such evolving threats.

Increase your SOC and assist your crew shield what you are promoting with free top-notch risk intelligence: Request TI Lookup Premium Trial.

Cyber Security News Tags:0Day, Execute, Exploited, Malware, Path, Traversal, Vulnerability, WinRAR

Post navigation

Previous Post: Cisco Warns of CVSS 10.0 FMC RADIUS Flaw Allowing Remote Code Execution
Next Post: Cisco Patches Critical Vulnerability in Firewall Management Platform

Related Posts

Hackers Attacking Fortinet SSL VPN Under Attack From 780 unique IPs Cyber Security News
System Admins Beware! Weaponized Putty Ads in Bing Installs Remote Access Tools Cyber Security News
Critical Vulnerabilities Uncovered in Zero Trust Network Access Products of Check Point, Zscale,r and NetSkope Cyber Security News
Hands-on Malware Analysis Training to Boost Up SOC & MSSP Teams Cyber Security News
Dutch Intelligence Exposes Russian “Laundry Bear” Cyber Group Behind Police Hack Cyber Security News
AI Crawlers Reshape The Internet With Over 30% of Global Web Traffic Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Slow and Steady Security: Lessons from the Tortoise and the Hare
  • Lenovo AI Chatbot Vulnerability Let Attackers Run Remote Scripts on Corporate Machines
  • Experts Find AI Browsers Can Be Tricked by PromptFix Exploit to Run Malicious Hidden Prompts
  • RapperBot Botnet Disrupted, American Administrator Indicted
  • Seemplicity Raises $50 Million for Exposure Management Platform

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Slow and Steady Security: Lessons from the Tortoise and the Hare
  • Lenovo AI Chatbot Vulnerability Let Attackers Run Remote Scripts on Corporate Machines
  • Experts Find AI Browsers Can Be Tricked by PromptFix Exploit to Run Malicious Hidden Prompts
  • RapperBot Botnet Disrupted, American Administrator Indicted
  • Seemplicity Raises $50 Million for Exposure Management Platform

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News