Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Hackers Actively Exploiting 7-Zip RCE Vulnerability in the Wild

Hackers Actively Exploiting 7-Zip RCE Vulnerability in the Wild

Posted on November 19, 2025November 19, 2025 By CWS

Hackers have begun actively exploiting a important distant code execution (RCE) vulnerability within the common file archiver 7-Zip, placing tens of millions of customers prone to malware an infection and system compromise.

The flaw, tracked as CVE-2025-11001, stems from improper dealing with of symbolic hyperlinks in ZIP archives, permitting attackers to traverse directories and execute arbitrary code on susceptible programs.

First disclosed in October 2025, this vulnerability has a CVSS v3 rating of seven.0, highlighting its excessive severity as a result of potential for widespread exploitation with out requiring elevated privileges.​

7-Zip RCE Vulnerability Exploited

CVE-2025-11001 arises in the course of the parsing of ZIP information containing crafted symbolic hyperlinks, which trick 7-Zip into writing information outdoors the meant extraction listing.

This listing traversal can allow attackers to overwrite important system information or inject malicious payloads, resulting in full code execution within the context of the consumer or service account operating the appliance.

Safety researchers at Development Micro’s Zero Day Initiative (ZDI) detailed how an attacker might leverage this to flee sandboxed environments, making it significantly harmful for automated file processing in enterprise settings.​

The vulnerability was found by Ryota Shiga of GMO Flatt Safety Inc., in collaboration with their AI-powered AppSec Auditor device, and reported promptly to the 7-Zip builders.

A proof-of-concept (PoC) exploit has since been publicly launched, demonstrating how a malicious ZIP file can abuse symbolic hyperlink dealing with to facilitate arbitrary file writes and, in sure situations, direct RCE.

This PoC has lowered the barrier for risk actors, accelerating real-world assaults noticed within the wild. Notably, exploitation requires minimal consumer interplay; merely opening or extracting a booby-trapped archive suffices, a typical vector in phishing campaigns and drive-by downloads.​

This challenge isn’t remoted; 7-Zip model 25.00, launched in July 2025, additionally patches a associated flaw, CVE-2025-11002, which shares the identical symbolic hyperlink mishandling root trigger and carries an similar CVSS rating of seven.0.

Each vulnerabilities have been launched in model 21.02, affecting all prior releases of the open-source device utilized by over 100 million Home windows customers worldwide for compression duties. Early indicators recommend attackers are focusing on unpatched programs in sectors like healthcare and finance, the place file dealing with is routine.​

The U.Okay.’s NHS England Digital issued an pressing advisory on November 18, 2025, confirming lively exploitation of CVE-2025-11001, urging rapid updates to mitigate dangers.

Risk actors might use this RCE to deploy ransomware, steal delicate knowledge, or set up persistent backdoors, amplifying the hazard in provide chain assaults the place compromised archives unfold by way of e mail or shared drives.

Organizations counting on 7-Zip for bulk file operations face elevated threats, as automated extractions might silently propagate malware throughout networks.​

To counter this risk, customers and organizations should replace 7-Zip to model 25.00 or later, out there from the official web site, which enforces stricter path canonicalization to dam traversal makes an attempt.

The patch prevents symbolic hyperlinks from escaping extraction boundaries, neutralizing each CVE-2025-11001 and CVE-2025-11002. Affected platforms embrace all Home windows variations operating 7-Zip previous to 25.00, with no reported impacts on Linux or macOS ports but.​

Comply with us on Google Information, LinkedIn, and X for day by day cybersecurity updates. Contact us to characteristic your tales.

Cyber Security News Tags:7Zip, Actively, Exploiting, Hackers, RCE, Vulnerability, Wild

Post navigation

Previous Post: Go-to Tool for IT Admins, Security Pros, and Threat Hunters Coming to Windows
Next Post: Seraphic Becomes the First and Only Secure Enterprise Browser Solution to Protect Electron-Based Applications

Related Posts

TA446 Hackers Unleash DarkSword Kit on iOS Devices TA446 Hackers Unleash DarkSword Kit on iOS Devices Cyber Security News
Hackers Extensively Abuses Visual Studio Code to Execute Malicious Payloads on Victim System Hackers Extensively Abuses Visual Studio Code to Execute Malicious Payloads on Victim System Cyber Security News
LLM-enabled MalTerminal Malware Leverages GPT-4 to Generate Ransomware Code LLM-enabled MalTerminal Malware Leverages GPT-4 to Generate Ransomware Code Cyber Security News
VoidLink Rewrites Rootkit Playbook with Server-Side Kernel Compilation and AI-Assisted Code VoidLink Rewrites Rootkit Playbook with Server-Side Kernel Compilation and AI-Assisted Code Cyber Security News
H2Miner Attacking Linux, Windows, and Containers to Mine Monero H2Miner Attacking Linux, Windows, and Containers to Mine Monero Cyber Security News
Hackers Exploit Windows File Explorer for Malware Delivery Hackers Exploit Windows File Explorer for Malware Delivery Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Mythos Excels in Vulnerability Detection, Faces Varied Challenges
  • OpenAI Faces Lawsuit Over ChatGPT Data Sharing Practices
  • Revolutionizing Data Center Security with DPUs
  • Ghostwriter Intensifies Phishing Attacks on Ukraine
  • AI Enhances Security with Realistic Attack Simulations

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Mythos Excels in Vulnerability Detection, Faces Varied Challenges
  • OpenAI Faces Lawsuit Over ChatGPT Data Sharing Practices
  • Revolutionizing Data Center Security with DPUs
  • Ghostwriter Intensifies Phishing Attacks on Ukraine
  • AI Enhances Security with Realistic Attack Simulations

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark