WinRAR Directory Vulnerability Allows Arbitrary Code Execution Using a Malicious File

A severe security vulnerability has been identified in RARLAB’s WinRAR software that enables remote attackers to execute arbitrary code through malicious archive files.  The flaw, designated as CVE-2025-6218, carries a CVSS score of 7.8 and affects the handling of directory paths within archive files by the widely used file compression utility. WinRAR RCE Flaw The […] The post WinRAR Directory Vulnerability Allows Arbitrary Code Execution Using a Malicious File appeared first on Cyber Security News.

Jun 24, 2025 - 10:30
 0
WinRAR Directory Vulnerability Allows Arbitrary Code Execution Using a Malicious File
Summary
1. A high-severity flaw (CVE-2025-6218) in WinRAR allows attackers to execute arbitrary code by exploiting how the software handles file paths within archives.
2. The vulnerability enables attackers to use specially crafted archive files with directory traversal sequences, leading to remote code execution.
3. Exploitation depends on user action, such as downloading or opening a malicious archive or visiting a compromised webpage
4. RARLAB has released a security update; users should promptly upgrade WinRAR to the latest version to protect their systems.

A severe security vulnerability has been identified in RARLAB’s WinRAR software that enables remote attackers to execute arbitrary code through malicious archive files. 

The flaw, designated as CVE-2025-6218, carries a CVSS score of 7.8 and affects the handling of directory paths within archive files by the widely used file compression utility.

WinRAR RCE Flaw

The directory traversal vulnerability, formally catalogued as ZDI-25-409, represents a significant security risk for WinRAR users worldwide. 

This remote code execution (RCE) vulnerability allows attackers to execute malicious code in the context of the current user, though it requires user interaction to be successfully exploited. 

The vulnerability’s CVSS vector string AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H indicates high impact across confidentiality, integrity, and availability metrics.

The exploitation mechanism centers on crafted file paths within archive files that can cause the WinRAR process to traverse to unintended directories. 

This path traversal attack bypasses normal security boundaries, enabling attackers to write files to locations outside the intended extraction directory. 

Such vulnerabilities are particularly dangerous because they can lead to complete system compromise when combined with other attack techniques.

Technical analysis reveals that the vulnerability exists within WinRAR’s file path handling routines when processing archive files. 

Security researcher whs3-detonator, who discovered and reported the flaw, identified that specially crafted archive files containing malicious directory paths can manipulate the extraction process. 

The attack vector requires the target user to either visit a malicious webpage or open a malicious archive file, making it susceptible to social engineering attacks.

The technical exploitation leverages directory traversal sequences embedded within the archive file structure. 

These sequences can include relative path indicators such as “../” patterns that allow the attacker to navigate outside the intended extraction directory. 

Once successful, the vulnerability enables arbitrary code execution with the privileges of the user running WinRAR.

Risk FactorsDetails
Affected ProductsRARLAB WinRAR (all versions prior to patch released on June 19, 2025)
ImpactRemote Code Execution (RCE)
Exploit PrerequisitesUser interaction required (opening a malicious archive file or visiting a compromised webpage
CVSS 3.1 Score7.8 (High)

Mitigation

RARLAB has promptly addressed this critical security issue by releasing an updated version of WinRAR. 

Users are recommended to update to WinRAR 7.11 to experience faster speeds, improved usability, and new customization options.

The vendor has published detailed information about the security update, emphasizing the importance of applying this patch to prevent potential exploitation. 

Organizations should prioritize this update due to the high severity rating and the potential for remote code execution attacks targeting their systems.

Are you from SOC/DFIR Teams! - Interact with malware in the sandbox and find related IOCs. - Request 14-day free trial

The post WinRAR Directory Vulnerability Allows Arbitrary Code Execution Using a Malicious File appeared first on Cyber Security News.