Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

7-Zip Arbitrary File Write Vulnerability Let Attackers Execute Arbitrary Code

Posted on August 11, 2025August 11, 2025 By CWS

A newly disclosed safety vulnerability within the in style 7-Zip file compression software program has raised vital issues within the cybersecurity group.

CVE-2025-55188, found and reported by safety researcher Landon on August 9, 2025, permits attackers to carry out arbitrary file writes throughout archive extraction, doubtlessly resulting in code execution on susceptible techniques.

The vulnerability impacts all variations of 7-Zip previous to 25.01 and stems from improper dealing with of symbolic hyperlinks through the extraction course of.

When customers extract a maliciously crafted archive containing unsafe symbolic hyperlinks, 7-Zip follows these hyperlinks throughout extraction, enabling attackers to jot down information to places exterior the meant extraction listing.

7-Zip Arbitrary File Write Vulnerability

The vulnerability exploits 7-Zip’s symbolic hyperlink processing mechanism. In keeping with the safety advisory, the assault requires particular situations to achieve success.

For Linux techniques, attackers want the goal to be utilizing a susceptible 7-Zip model whereas extracting an archive format that helps symbolic hyperlinks, equivalent to ZIP, TAR, 7Z, or RAR information. The exploitation course of is extra easy on Linux environments.

On Home windows techniques, further necessities should be met for profitable exploitation. The 7-Zip extraction course of should have elevated privileges or function in Home windows Developer Mode to create symbolic hyperlinks. This makes Home windows techniques considerably much less prone however not resistant to the assault.

As soon as these situations are met, attackers can craft malicious archives containing symbolic hyperlinks that time to delicate system information. When extracted, 7-Zip follows these symbolic hyperlinks, permitting attackers to overwrite important information equivalent to SSH keys, .bashrc information, or different system configurations.

Regardless of receiving a CVSS rating of two.7, which categorizes it as low severity, safety specialists warn that the sensible influence could possibly be way more vital. The vulnerability allows attackers to realize unauthorized entry and code execution by focusing on delicate information that management system habits.

Throughout a single extraction operation, attackers can try a number of file overwrites, growing their possibilities of compromising the goal system.

The vulnerability is especially regarding as a result of 7-Zip shows file paths earlier than symbolic hyperlink decision, permitting attackers to cover the true vacation spot of their malicious writes.

Mitigations

7-Zip model 25.01, launched on August 3, 2025, addresses this vulnerability with enhanced symbolic hyperlink dealing with. The replace contains vital safety enhancements to forestall unsafe symbolic hyperlink creation throughout archive extraction.

The brand new model introduces a command-line change (-snld20) that may bypass the default safety checks when creating symbolic hyperlinks, offering directors with managed flexibility whereas sustaining safety by default.

Safety researchers have emphasised the significance of fast patching, significantly given 7-Zip’s widespread utilization throughout enterprise and private computing environments. The vulnerability has been tracked in a number of safety databases and has prompted advisories from varied cybersecurity organizations.

Mitigation methods embrace updating to 7-Zip 25.01 instantly, avoiding extraction of archives from untrusted sources, and implementing sandboxed environments for dealing with unknown information. Organizations also needs to audit their techniques to make sure all 7-Zip installations are up to date, because the software program lacks automated replace capabilities.

This incident follows a sample of latest vulnerabilities in 7-Zip, together with CVE-2025-0411 and CVE-2024-11477, demonstrating the continued want for vigilant safety practices when dealing with compressed information from untrusted sources.

Equip your SOC with full entry to the newest risk knowledge from ANY.RUN TI Lookup that may Enhance incident response -> Get 14-day Free Trial

Cyber Security News Tags:7Zip, Arbitrary, Attackers, Code, Execute, File, Vulnerability, Write

Post navigation

Previous Post: How to Secure Remote Desktop Access
Next Post: GPT-5 Jailbreaked With Echo Chamber and Storytelling Attacks

Related Posts

UNC3886 Actors Know for Exploiting 0-Days Attacking Singapore’s Critical Infrastructure Cyber Security News
Hackers Exploiting Blind Spots in DNS Records to Store and Deliver Malware Cyber Security News
Microsoft Investigating Forms Service Issue Not Accessible for Users Cyber Security News
Conducting Risk Assessments That Drive Business Value Cyber Security News
Cloud Security Essentials – Protecting Multi-Cloud Environments Cyber Security News
Lumma Password Stealer Attack Infection Chain and Its Escalation Tactics Uncovered Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • New ‘Curly COMrades’ APT Hackers Attacking Targeting Critical Organizations in Countries
  • Hackers Could Gain Full Control of Your Rooted Android Devices by Exploiting One Vulnerability
  • Microsoft Office Vulnerabilities Let Attackers Execute Remote Code
  • New PS1Bot Malware Campaign Uses Malvertising to Deploy Multi-Stage In-Memory Attacks
  • New Multi-Stage Tycoon2FA Phishing Attack Now Beats Top Security Systems

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • New ‘Curly COMrades’ APT Hackers Attacking Targeting Critical Organizations in Countries
  • Hackers Could Gain Full Control of Your Rooted Android Devices by Exploiting One Vulnerability
  • Microsoft Office Vulnerabilities Let Attackers Execute Remote Code
  • New PS1Bot Malware Campaign Uses Malvertising to Deploy Multi-Stage In-Memory Attacks
  • New Multi-Stage Tycoon2FA Phishing Attack Now Beats Top Security Systems

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News