CVE-2025-0411
7-Zip Mark of the Web Bypass Vulnerability - [Actively Exploited]
Description
7-Zip Mark-of-the-Web Bypass Vulnerability. This vulnerability allows remote attackers to bypass the Mark-of-the-Web protection mechanism on affected installations of 7-Zip. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of archived files. When extracting files from a crafted archive that bears the Mark-of-the-Web, 7-Zip does not propagate the Mark-of-the-Web to the extracted files. An attacker can leverage this vulnerability to execute arbitrary code in the context of the current user. Was ZDI-CAN-25456.
INFO
Published Date :
Jan. 25, 2025, 5:15 a.m.
Last Modified :
Feb. 12, 2025, 6:14 p.m.
Source :
[email protected]
Remotely Exploitable :
No
Impact Score :
5.9
Exploitability Score :
1.0
CISA KEV (Known Exploited Vulnerabilities)
For the benefit of the cybersecurity community and network defenders—and to help every organization better manage vulnerabilities and keep pace with threat activity—CISA maintains the authoritative source of vulnerabilities that have been exploited in the wild.
7-Zip contains a protection mechanism failure vulnerability that allows remote attackers to bypass the Mark-of-the-Web security feature to execute arbitrary code in the context of the current user.
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
https://www.7-zip.org/history.txt ; https://nvd.nist.gov/vuln/detail/CVE-2025-0411
Public PoC/Exploit Available at Github
CVE-2025-0411 has a 7 public PoC/Exploit
available at Github.
Go to the Public Exploits
tab to see the list.
References to Advisories, Solutions, and Tools
Here, you will find a curated list of external links that provide in-depth
information, practical solutions, and valuable tools related to
CVE-2025-0411
.
URL | Resource |
---|---|
https://www.zerodayinitiative.com/advisories/ZDI-25-045/ | Third Party Advisory VDB Entry |
http://www.openwall.com/lists/oss-security/2025/01/24/6 | Mailing List |
https://security.netapp.com/advisory/ntap-20250207-0005/ | Third Party Advisory |
https://www.vicarius.io/vsociety/posts/cve-2025-0411-7-zip-mitigation-vulnerability | Mitigation |
https://www.vicarius.io/vsociety/posts/cve-2025-0411-detection-7-zip-vulnerability | Mitigation |
We scan GitHub repositories to detect new proof-of-concept exploits. Following list is a collection of public exploits and proof-of-concepts, which have been published on GitHub (sorted by the most recently updated).
None
Python C++
7-Zip Mark-of-the-Web绕过漏洞PoC(CVE-2025-0411)
C++
This repository contains POC scenarios as part of CVE-2025-0411 MotW bypass.
7zip cve cve-2025-0411 cve-2025-0411-poc payload-delivery poc
This repository contains POC scenarios as part of CVE-2025-0411 MotW bypass.
7zip cve payload-delivery poc cve-2025-0411 cve-2025-0411-poc
C++
TOP All bugbounty pentesting CVE-2023- POC Exp RCE example payload Things
bugbounty cve exp exploit payload poc rce vulnerability
Shell
https://dhmosfunk.github.io/
📡 PoC auto collect from GitHub. ⚠️ Be careful Malware.
security cve exploit poc vulnerability
Results are limited to the first 15 repositories due to potential performance issues.
The following list is the news that have been mention
CVE-2025-0411
vulnerability anywhere in the article.

-
The Hacker News
⚡ THN Weekly Recap: Top Cybersecurity Threats, Tools and Tips [10 February]
Cybersecurity / Weekly Recap In cybersecurity, the smallest crack can lead to the biggest breaches. A leaked encryption key, an unpatched software bug, or an abandoned cloud storage bucket—each one se ... Read more

-
The Hacker News
XE Hacker Group Exploits VeraCore Zero-Day to Deploy Persistent Web Shells
Threat actors have been observed exploiting multiple security flaws in various software products, including Progress Telerik UI for ASP.NET AJAX and Advantive VeraCore, to drop reverse shells and web ... Read more

-
Help Net Security
Week in review: Exploited 7-Zip 0-day flaw, crypto-stealing malware found on App Store, Google Play
Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Russian cybercrooks exploiting 7-Zip zero-day vulnerability (CVE-2025-0411) CVE-2025-0411, a Mark-of-t ... Read more

-
Ars Technica
7-Zip 0-day was exploited in Russia’s ongoing invasion of Ukraine
Researchers said they recently discovered a zero-day vulnerability in the 7-Zip archiving utility that was actively exploited as part of Russia's ongoing invasion of Ukraine. The vulnerability allowed ... Read more

-
Help Net Security
Cybercrime gang exploited VeraCore zero-day vulnerabilities for years (CVE-2025-25181, CVE-2024-57968)
XE Group, a cybercriminal outfit that has been active for over a decade, has been quietly exploiting zero-day vulnerabilities (CVE-2025-25181, CVE-2024-57968) in VeraCore software, a popular solution ... Read more

-
Help Net Security
Swap EOL Zyxel routers, upgrade Netgear ones!
There will be no patches for EOL Zyxel routers under attack via CVE-2024-40891, the company has confirmed. Meanwhile, Netgear has issued patches for critical flaws affecting its routers and wireless a ... Read more

-
security.nl
'Kwetsbaarheid in 7-Zip sinds september actief misbruikt bij aanvallen'
Een kwetsbaarheid in de populaire archiveringssoftware 7-Zip is sinds vorig jaar september actief misbruikt bij aanvallen, toen er nog geen beveiligingsupdate beschikbaar was om het probleem te verhel ... Read more

-
BleepingComputer
7-Zip MotW bypass exploited in zero-day attacks against Ukraine
A 7-Zip vulnerability allowing attackers to bypass the Mark of the Web (MotW) Windows security feature was exploited by Russian hackers as a zero-day since September 2024. According to Trend Micro res ... Read more

-
Help Net Security
Russian cybercrooks exploiting 7-Zip zero-day vulnerability (CVE-2025-0411)
CVE-2025-0411, a Mark-of-the-Web bypass vulnerability in the open-source archiver tool 7-Zip that was fixed in November 2024, has been exploited in zero-day attacks to deliver malware to Ukrainian ent ... Read more

-
The Hacker News
Russian Cybercrime Groups Exploiting 7-Zip Flaw to Bypass Windows MotW Protections
Vulnerability / Cyber Espionage A recently patched security vulnerability in the 7-Zip archiver tool was exploited in the wild to deliver the SmokeLoader malware. The flaw, CVE-2025-0411 (CVSS score: ... Read more

-
Trend Micro
CVE-2025-0411: Ukrainian Organizations Targeted in Zero-Day Campaign and Homoglyph Attacks
Summary In September, 2024 the Zero Day Initiative (ZDI) Threat Hunting team identified the exploitation of a 7-Zip zero-day vulnerability used in a SmokeLoader malware campaign targeting Ukrainian en ... Read more

-
Kaspersky
How to migrate to SASE and zero trust | Kaspersky official blog
The traditional network security model — with a secure perimeter and encrypted channels for external access to that perimeter — is coming apart at the seams. Cloud services and remote working have cha ... Read more

-
TheCyberThrone
TheCyberThrone Security BiWeekly Review – January 25, 2025
Welcome to TheCyberThrone. Cybersecurity week in review will be posted covering the important security happenings. This review is for the bi-weekly ending on Saturday, January 25, 2025.CVE-2025-0411 i ... Read more
The following table lists the changes that have been made to the
CVE-2025-0411
vulnerability over time.
Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability's severity, exploitability, or other characteristics.
-
Initial Analysis by [email protected]
Feb. 12, 2025
Action Type Old Value New Value Added CVSS V3.1 NIST AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H Added CWE NIST NVD-CWE-noinfo Added CPE Configuration OR *cpe:2.3:a:7-zip:7-zip:*:*:*:*:*:*:*:* versions up to (excluding) 24.09 Changed Reference Type http://www.openwall.com/lists/oss-security/2025/01/24/6 No Types Assigned http://www.openwall.com/lists/oss-security/2025/01/24/6 Mailing List Changed Reference Type https://security.netapp.com/advisory/ntap-20250207-0005/ No Types Assigned https://security.netapp.com/advisory/ntap-20250207-0005/ Third Party Advisory Changed Reference Type https://www.vicarius.io/vsociety/posts/cve-2025-0411-7-zip-mitigation-vulnerability No Types Assigned https://www.vicarius.io/vsociety/posts/cve-2025-0411-7-zip-mitigation-vulnerability Mitigation Changed Reference Type https://www.vicarius.io/vsociety/posts/cve-2025-0411-detection-7-zip-vulnerability No Types Assigned https://www.vicarius.io/vsociety/posts/cve-2025-0411-detection-7-zip-vulnerability Mitigation Changed Reference Type https://www.zerodayinitiative.com/advisories/ZDI-25-045/ No Types Assigned https://www.zerodayinitiative.com/advisories/ZDI-25-045/ Third Party Advisory, VDB Entry -
CVE Modified by af854a3a-2127-422b-91ae-364da2661108
Feb. 07, 2025
Action Type Old Value New Value Added Reference https://security.netapp.com/advisory/ntap-20250207-0005/ -
CVE CISA KEV Update by 9119a7d8-5eab-497f-8521-727c672e3725
Feb. 07, 2025
Action Type Old Value New Value Added Date Added 2025-02-06 Added Due Date 2025-02-27 Added Vulnerability Name 7-Zip Mark of the Web Bypass Vulnerability Added Required Action Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. -
CVE Modified by af854a3a-2127-422b-91ae-364da2661108
Jan. 29, 2025
Action Type Old Value New Value Added Reference https://www.vicarius.io/vsociety/posts/cve-2025-0411-7-zip-mitigation-vulnerability Added Reference https://www.vicarius.io/vsociety/posts/cve-2025-0411-detection-7-zip-vulnerability -
New CVE Received by [email protected]
Jan. 25, 2025
Action Type Old Value New Value Added Description 7-Zip Mark-of-the-Web Bypass Vulnerability. This vulnerability allows remote attackers to bypass the Mark-of-the-Web protection mechanism on affected installations of 7-Zip. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of archived files. When extracting files from a crafted archive that bears the Mark-of-the-Web, 7-Zip does not propagate the Mark-of-the-Web to the extracted files. An attacker can leverage this vulnerability to execute arbitrary code in the context of the current user. Was ZDI-CAN-25456. Added CVSS V3 AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H Added CWE CWE-693 Added Reference https://www.zerodayinitiative.com/advisories/ZDI-25-045/ -
CVE Modified by af854a3a-2127-422b-91ae-364da2661108
Jan. 25, 2025
Action Type Old Value New Value Added Reference http://www.openwall.com/lists/oss-security/2025/01/24/6
CWE - Common Weakness Enumeration
While CVE identifies
specific instances of vulnerabilities, CWE categorizes the common flaws or
weaknesses that can lead to vulnerabilities. CVE-2025-0411
is
associated with the following CWEs:
Common Attack Pattern Enumeration and Classification (CAPEC)
Common Attack Pattern Enumeration and Classification
(CAPEC)
stores attack patterns, which are descriptions of the common attributes and
approaches employed by adversaries to exploit the CVE-2025-0411
weaknesses.