Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Hackers Actively Exploiting 7-Zip Symbolic Link–Based RCE Vulnerability (CVE-2025-11001)

Hackers Actively Exploiting 7-Zip Symbolic Link–Based RCE Vulnerability (CVE-2025-11001)

Posted on November 19, 2025November 19, 2025 By CWS

Nov 19, 2025Ravie LakshmananVulnerability / Risk Intelligence
A just lately disclosed safety flaw impacting 7-Zip has come underneath energetic exploitation within the wild, in response to an advisory issued by the U.Okay. NHS England Digital on Tuesday.
The vulnerability in query is CVE-2025-11001 (CVSS rating: 7.0), which permits distant attackers to execute arbitrary code. It has been addressed in 7-Zip model 25.00 launched in July 2025.
“The particular flaw exists inside the dealing with of symbolic hyperlinks in ZIP recordsdata. Crafted information in a ZIP file may cause the method to traverse to unintended directories,” Pattern Micro’s Zero Day Initiative (ZDI) stated in an alert launched final month. “An attacker can leverage this vulnerability to execute code within the context of a service account.”
Ryota Shiga of GMO Flatt Safety Inc., together with the corporate’s synthetic intelligence (AI)-powered AppSec Auditor Takumi, has been credited with discovering and reporting the vulnerability.

It is value noting that 7-Zip 25.00 additionally resolves one other flaw, CVE-2025-11002 (CVSS rating: 7.0), that permits for distant code execution by making the most of improper dealing with of symbolic hyperlinks inside ZIP archives, leading to listing traversal. Each shortcomings had been launched in model 21.02.
“Lively exploitation of CVE-2025-11001 has been noticed within the wild,” NHS England Digital stated. Nonetheless, there are at the moment no particulars accessible on the way it’s being weaponized, by whom, and in what context.
Provided that there exists proof-of-concept (PoC) exploits, it is important that 7-Zip customers transfer rapidly to use the mandatory fixes as quickly as doable, if not already, for optimum safety.
“This vulnerability can solely be exploited from the context of an elevated person / service account or a machine with developer mode enabled,” safety researcher Dominik (aka pacbypass), who launched the PoC, stated in a submit detailing the failings. “This vulnerability can solely be exploited on Home windows.”

The Hacker News Tags:7Zip, Actively, CVE202511001, Exploiting, Hackers, LinkBased, RCE, Symbolic, Vulnerability

Post navigation

Previous Post: ‘The Gentlemen’ Ransomware Group with Dual-Extortion Strategy Encrypts and Exfiltrates Data
Next Post: Go-to Tool for IT Admins, Security Pros, and Threat Hunters Coming to Windows

Related Posts

Cybercriminals Exploit Remote Monitoring Tools to Infiltrate Logistics and Freight Networks Cybercriminals Exploit Remote Monitoring Tools to Infiltrate Logistics and Freight Networks The Hacker News
Optimize Your SOC: Build, Buy, or Automate? Optimize Your SOC: Build, Buy, or Automate? The Hacker News
A Healthcare CISO’s Journey to Enabling Modern Care A Healthcare CISO’s Journey to Enabling Modern Care The Hacker News
Researchers Capture Lazarus APT’s Remote-Worker Scheme Live on Camera Researchers Capture Lazarus APT’s Remote-Worker Scheme Live on Camera The Hacker News
What Security Leaders Need to Know in 2025 What Security Leaders Need to Know in 2025 The Hacker News
“Jingle Thief” Hackers Exploit Cloud Infrastructure to Steal Millions in Gift Cards “Jingle Thief” Hackers Exploit Cloud Infrastructure to Steal Millions in Gift Cards The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Mythos Excels in Vulnerability Detection, Faces Varied Challenges
  • OpenAI Faces Lawsuit Over ChatGPT Data Sharing Practices
  • Revolutionizing Data Center Security with DPUs
  • Ghostwriter Intensifies Phishing Attacks on Ukraine
  • AI Enhances Security with Realistic Attack Simulations

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Mythos Excels in Vulnerability Detection, Faces Varied Challenges
  • OpenAI Faces Lawsuit Over ChatGPT Data Sharing Practices
  • Revolutionizing Data Center Security with DPUs
  • Ghostwriter Intensifies Phishing Attacks on Ukraine
  • AI Enhances Security with Realistic Attack Simulations

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark