Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

7-Zip Vulnerabilities Allows Remote Attackers to Execute Arbitrary Code

Posted on October 10, 2025October 10, 2025 By CWS

Two high-severity vulnerabilities have been found within the in style open-source file archiver, 7-Zip, which may permit distant attackers to execute arbitrary code.

Recognized as CVE-2025-11001 and CVE-2025-11002, the failings have an effect on all variations of the software program previous to the most recent launch and require instant patching.

Flaw in Symbolic Hyperlink Processing

The core of each vulnerabilities lies inside the way in which 7-Zip handles symbolic hyperlinks embedded in ZIP archives. In accordance with the advisory, a risk actor can create a malicious ZIP file containing crafted knowledge that exploits this weak spot.

When a person with a weak model of 7-Zip makes an attempt to decompress the archive, the flawed course of may be manipulated to carry out a listing traversal.

This enables the extraction course of to put in writing recordsdata exterior of the supposed vacation spot folder, doubtlessly inserting malicious payloads in delicate system places.

Whereas the assault is initiated remotely by the supply of the malicious file, exploitation requires person interplay, because the sufferer should select to open the archive. The particular assault vectors could differ relying on how 7-Zip is carried out inside completely different environments.

Each CVE-2025-11001 and CVE-2025-11002 have been assigned a CVSS 3.0 rating of seven.0, classifying them as high-severity threats.

A profitable exploit may permit an attacker to execute arbitrary code on the affected system with the privileges of the service account or person working the 7-Zip software.

This might result in a full system compromise, knowledge theft, or the deployment of additional malware akin to ransomware.

The excessive complexity of the assault and the requirement for person interplay forestall the vulnerabilities from receiving a crucial ranking, however the potential influence on confidentiality, integrity, and availability stays important given the widespread use of the 7-Zip utility.

CVE IDAffected ProductVulnerabilityCVSS 3.0 ScoreCVE-2025-110027-Zip (variations earlier than 25.00)Arbitrary Code Execution through Symbolic Hyperlink Handling7.0 (Excessive)CVE-2025-110017-Zip (variations earlier than 25.00)Arbitrary Code Execution through Symbolic Hyperlink Handling7.0 (Excessive)

The developer of 7-Zip has launched model 25.00, which rectifies these safety flaws. All customers are strongly suggested to replace their installations instantly to guard towards potential exploitation.

The vulnerabilities have been initially reported to the seller on Might 2, 2025, following a accountable disclosure timeline.

A coordinated public advisory was subsequently launched on October 7, 2025, to tell the general public of the dangers and the obtainable patch. These vulnerabilities have been uncovered by safety researcher Ryota Shiga of GMO Flatt Safety Inc., working with takumi-san.ai.

Cyber Consciousness Month Supply: Upskill With 100+ Premium Cybersecurity Programs From EHA’s Diamond Membership: Be a part of At this time

Cyber Security News Tags:7Zip, Arbitrary, Attackers, Code, Execute, Remote, Vulnerabilities

Post navigation

Previous Post: New Quishing Attack With Weaponized QR Code Targeting Microsoft Users
Next Post: Authorities Seize BreachForums New Clearnet Cybercrime Marketplace Domain

Related Posts

10 Best API Protection Tools in 2025 Cyber Security News
10 Best Cloud Penetration Testing Companies in 2025 Cyber Security News
New Battering RAM Attack Bypasses Latest Defenses on Intel and AMD Cloud Processors Cyber Security News
11 Best SysAdmin Tools – 2025 Cyber Security News
Conversation with Amazon’s Senior Software Development Engineer Naman Jain Cyber Security News
OneLogin AD Connector Vulnerabilities Exposes Authentication Credentials Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Juniper Networks Patches Critical Junos Space Vulnerabilities
  • Active Exploitation Detected in Gladinet and TrioFox Vulnerability
  • New Android Malware ClayRat Mimic as WhatsApp, Google Photos to Attack Users
  • Apple Bug Bounty Update: Top Payout $2 Million, $35 Million Paid to Date
  • Sophisticated Malware Deployed in Oracle EBS Zero-Day Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Juniper Networks Patches Critical Junos Space Vulnerabilities
  • Active Exploitation Detected in Gladinet and TrioFox Vulnerability
  • New Android Malware ClayRat Mimic as WhatsApp, Google Photos to Attack Users
  • Apple Bug Bounty Update: Top Payout $2 Million, $35 Million Paid to Date
  • Sophisticated Malware Deployed in Oracle EBS Zero-Day Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News