Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

CISA Added WinRaR Zero-Day (CVE-2025-8088) Vulnerability That is Actively Exploited In the Wild

Posted on August 13, 2025August 13, 2025 By CWS

The U.S. Cybersecurity and Infrastructure Safety Company has added this vulnerability to its Identified Exploited Vulnerabilities catalog, with a due date of September 2, 2025, for federal businesses to use mitigations.

WinRAR has launched model 7.13 to handle a important safety vulnerability that has been actively exploited by cybercriminals, marking one other vital safety incident for the favored file compression software program.

The vulnerability, designated CVE-2025-8088, permits attackers to execute arbitrary code by means of maliciously crafted archive information, prompting fast motion from customers worldwide.

Important Safety Flaw Exploited by Russian Hackers

The newly found vulnerability represents a severe menace to Home windows customers, with safety researchers confirming that it has been exploited in lively campaigns.

CVE-2025-8088 is a path traversal vulnerability that impacts the Home windows variations of WinRAR, UnRAR, and related elements, permitting specifically crafted archives to bypass user-specified extraction paths and write information to unintended places on the file system.

This functionality allows attackers to execute arbitrary code on compromised techniques, making it a very harmful safety flaw.

ESET researchers have linked this vulnerability to exploitation by the Russian RomCom group, which has been focusing on firms throughout Europe and Canada.

The cybersecurity agency’s analysis staff, together with Anton Cherepanov, Peter Košinár, and Peter Strýček, found the vulnerability and reported it to WinRAR builders.

The vulnerability has been assigned a CVSS rating of 8.4, classifying it as HIGH severity, which underscores the important nature of this safety problem.

Technical Particulars and Affected Methods

The listing traversal vulnerability is distinct from a beforehand patched safety flaw that was addressed in WinRAR model 7.12, indicating that this represents a brand new assault vector that required separate remediation. The affected techniques embrace:

WinRAR for Home windows – All desktop installations of the first software program.

RAR and UnRAR command-line utilities – Home windows variations of those instruments.

UnRAR.dll and transportable UnRAR – Dynamic library and standalone variations.

Model vary affected – All WinRAR variations from 0 by means of 7.12.

Unaffected platforms – Linux/Unix builds and RAR for Android stay safe.

The vulnerability impacts all WinRAR variations from 0 by means of 7.12, which means that just about all current installations require fast updating.

The trail traversal mechanism permits malicious archives to flee their supposed extraction directories, probably overwriting system information or putting executable code in places the place it may be mechanically executed by the working system.

The sort of assault can result in full system compromise, knowledge theft, or deployment of further malware payloads.

WinRAR customers should instantly replace to model 7.13, which was launched on July 30, 2025, with up to date launch notes revealed on August 12, 2025.

The replace addresses not solely the important safety vulnerability but additionally fixes a number of bugs from the earlier model, together with points with the “Import settings from file” command and restoration dimension settings for older compression profiles.

The urgency of this replace can’t be overstated, significantly given the confirmed exploitation within the wild. Organizations and particular person customers ought to prioritize this replace throughout all Home windows techniques operating WinRAR.

Past the fast safety repair, WinRAR 7.13 continues to supply superior NTFS options that distinguish it from different compression instruments, together with built-in choices to protect symbolic hyperlinks and archive Alternate Knowledge Streams (ADS).

These capabilities stay invaluable for backup, deployment, and forensic environments, however customers should guarantee they’re operating the most recent safe model to learn from these options safely.

Customers who can’t instantly replace ought to think about discontinuing use of WinRAR till the replace could be utilized, significantly in environments the place untrusted archive information are usually processed.

Uncover full scope of any assault any assault from hidden redirects to payloads in minutes — Strive ANY.RUN free for 14 days.

Cyber Security News Tags:Actively, Added, CISA, CVE20258088, Exploited, Vulnerability, Wild, WinRAR, ZeroDay

Post navigation

Previous Post: Microsoft Removes PowerShell 2.0  from Windows To Clean up Legacy Code
Next Post: How to Secure Your GitHub Repositories

Related Posts

Jetflicks Illegal Paid Streaming Service Operators Jailed for 7 Years Cyber Security News
SAP’s July 2025 Patch Day Cyber Security News
Threat Actors Widely Abuse .COM TLD to Host Credential Phishing Website Cyber Security News
Post-Quantum Cryptography What CISOs Need to Know Cyber Security News
Ubiquiti UniFi Protect Camera Vulnerability Allows Remote Code Execution Cyber Security News
Kimsuky Hackers Using ClickFix Technique to Execute Malicious Scripts on Victim Machines Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • How to Secure Your GitHub Repositories
  • CISA Added WinRaR Zero-Day (CVE-2025-8088) Vulnerability That is Actively Exploited In the Wild
  • Microsoft Removes PowerShell 2.0  from Windows To Clean up Legacy Code
  • New ‘Curly COMrades’ APT Hackers Attacking Targeting Critical Organizations in Countries
  • Hackers Could Gain Full Control of Your Rooted Android Devices by Exploiting One Vulnerability

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • How to Secure Your GitHub Repositories
  • CISA Added WinRaR Zero-Day (CVE-2025-8088) Vulnerability That is Actively Exploited In the Wild
  • Microsoft Removes PowerShell 2.0  from Windows To Clean up Legacy Code
  • New ‘Curly COMrades’ APT Hackers Attacking Targeting Critical Organizations in Countries
  • Hackers Could Gain Full Control of Your Rooted Android Devices by Exploiting One Vulnerability

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News