Known Exploited Vulnerability
8.8
HIGH CVSS 3.1
CVE-2025-8088
RARLAB WinRAR Path Traversal Vulnerability - [Actively Exploited]
Description

A path traversal vulnerability affecting the Windows version of WinRAR allows the attackers to execute arbitrary code by crafting malicious archive files. This vulnerability was exploited in the wild and was discovered by Anton Cherepanov, Peter Košinár, and Peter Strýček from ESET.

INFO

Published Date :

Aug. 8, 2025, 12:15 p.m.

Last Modified :

Oct. 30, 2025, 3:50 p.m.

Remotely Exploit :

Yes !
CISA Notification
CISA KEV (Known Exploited Vulnerabilities)

For the benefit of the cybersecurity community and network defenders—and to help every organization better manage vulnerabilities and keep pace with threat activity—CISA maintains the authoritative source of vulnerabilities that have been exploited in the wild.

Description :

RARLAB WinRAR contains a path traversal vulnerability affecting the Windows version of WinRAR. This vulnerability could allow an attacker to execute arbitrary code by crafting malicious archive files.

Required Action :

Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

Notes :

https://www.win-rar.com/singlenewsview.html?&L=0&tx_ttnews%5Btt_news%5D=283&cHash=a64b4a8f662d3639dec8d65f47bc93c5 ; https://nvd.nist.gov/vuln/detail/CVE-2025-8088

Affected Products

The following products are affected by CVE-2025-8088 vulnerability. Even if cvefeed.io is aware of the exact versions of the products that are affected, the information is not represented in the table below.

ID Vendor Product Action
1 Microsoft windows
1 Rarlab winrar
1 Dtsearch dtsearch
CVSS Scores
The Common Vulnerability Scoring System is a standardized framework for assessing the severity of vulnerabilities in software and systems. We collect and displays CVSS scores from various sources for each CVE.
Score Version Severity Vector Exploitability Score Impact Score Source
CVSS 3.1 HIGH [email protected]
CVSS 4.0 HIGH [email protected]
Solution
Update WinRAR to the latest version to fix the path traversal vulnerability.
  • Update WinRAR to the latest version available.
  • Avoid opening archives from untrusted sources.
Public PoC/Exploit Available at Github

CVE-2025-8088 has a 78 public PoC/Exploit available at Github. Go to the Public Exploits tab to see the list.

CWE - Common Weakness Enumeration

While CVE identifies specific instances of vulnerabilities, CWE categorizes the common flaws or weaknesses that can lead to vulnerabilities. CVE-2025-8088 is associated with the following CWEs:

Common Attack Pattern Enumeration and Classification (CAPEC)

Common Attack Pattern Enumeration and Classification (CAPEC) stores attack patterns, which are descriptions of the common attributes and approaches employed by adversaries to exploit the CVE-2025-8088 weaknesses.

We scan GitHub repositories to detect new proof-of-concept exploits. Following list is a collection of public exploits and proof-of-concepts, which have been published on GitHub (sorted by the most recently updated).

Exploit Intel MCP Server

Python Makefile

Updated: 1 day, 14 hours ago
1 stars 0 fork 0 watcher
Born at : Feb. 17, 2026, 2:52 p.m. This repo has been linked 35 different CVEs too.

C2 Framework for security research - Post-exploitation, AD scanning, EDR evasion (Educational)

Python

Updated: 1 day, 12 hours ago
1 stars 0 fork 0 watcher
Born at : Feb. 17, 2026, 2:48 p.m. This repo has been linked 1 different CVEs too.

C2 Framework for security research - Post-exploitation, AD scanning, EDR evasion (Educational)

Python

Updated: 2 days, 23 hours ago
1 stars 0 fork 0 watcher
Born at : Feb. 15, 2026, 1:59 p.m. This repo has been linked 1 different CVEs too.

Herramienta avanzada de explotación transversal de ruta de WinRAR para CVE-2025-8088

Python

Updated: 5 days, 21 hours ago
0 stars 0 fork 0 watcher
Born at : Feb. 14, 2026, 2:10 a.m. This repo has been linked 1 different CVEs too.

None

Python

Updated: 6 days, 17 hours ago
0 stars 0 fork 0 watcher
Born at : Feb. 13, 2026, 8:36 a.m. This repo has been linked 1 different CVEs too.

None

Python

Updated: 1 week, 2 days ago
0 stars 0 fork 0 watcher
Born at : Feb. 11, 2026, 12:29 a.m. This repo has been linked 1 different CVEs too.

Mirror of https://github.com/nomi-sec/PoC-in-GitHub

Updated: 1 week, 4 days ago
0 stars 0 fork 0 watcher
Born at : Feb. 7, 2026, 10:02 a.m. This repo has been linked 789 different CVEs too.

Laboratorio PoC Exploit RAR (Path Traversal / Injection ) - CVE2025-8088 / 2025-6218

Python

Updated: 2 weeks, 1 day ago
0 stars 0 fork 0 watcher
Born at : Feb. 5, 2026, 12:19 a.m. This repo has been linked 2 different CVEs too.

Rust library that detects files which look normal but have been crafted to exploit parsing vulnerabilities

exploit mobile

Rust

Updated: 2 weeks ago
0 stars 0 fork 0 watcher
Born at : Feb. 4, 2026, 6:42 a.m. This repo has been linked 7 different CVEs too.

Defensive PowerShell tool for static inspection of RAR archives and detection of CVE-2025-8088 path traversal anomalies.

PowerShell

Updated: 1 month, 1 week ago
0 stars 0 fork 0 watcher
Born at : Jan. 11, 2026, 6:39 a.m. This repo has been linked 1 different CVEs too.

CVE 2025 8088

cve-2025-8088 font hacking

Python

Updated: 1 month, 1 week ago
26 stars 21 fork 21 watcher
Born at : Jan. 2, 2026, 6:19 p.m. This repo has been linked 1 different CVEs too.

None

Updated: 1 month, 4 weeks ago
0 stars 0 fork 0 watcher
Born at : Dec. 22, 2025, 10:12 a.m. This repo has been linked 10 different CVEs too.

🛠 Exploit CVE-2025-8088 with this Python tool to generate malicious WinRAR archives that ensure payload persistence in Windows startup folders.

cve cve-2025-8088 cybersecurity exploit poc redteam security-research vulnerability vunerability winrar zero-day zeroday

Python

Updated: 1 month, 1 week ago
0 stars 0 fork 0 watcher
Born at : Dec. 20, 2025, 1:52 p.m. This repo has been linked 1 different CVEs too.

Лабораторная работа №2 Разбор методик эксплуатации уязвимостей

Updated: 2 months ago
0 stars 0 fork 0 watcher
Born at : Dec. 16, 2025, 8:56 p.m. This repo has been linked 10 different CVEs too.

Comprehensive analysis and proof-of-concept for CVE-2025-6218 - WinRAR path traversal RCE vulnerability affecting versions 7.11 and earlier

Python PowerShell

Updated: 2 months ago
2 stars 0 fork 0 watcher
Born at : Dec. 15, 2025, 10:08 a.m. This repo has been linked 2 different CVEs too.

Results are limited to the first 15 repositories due to potential performance issues.

The following list is the news that have been mention CVE-2025-8088 vulnerability anywhere in the article.

  • The Hacker News
Google Reports State-Backed Hackers Using Gemini AI for Recon and Attack Support

Google on Thursday said it observed the North Korea-linked threat actor known as UNC2970 using its generative artificial intelligence (AI) model Gemini to conduct reconnaissance on its targets, as var ... Read more

Published Date: Feb 12, 2026 (1 week ago)
  • The Hacker News
Reynolds Ransomware Embeds BYOVD Driver to Disable EDR Security Tools

Cybersecurity researchers have disclosed details of an emergent ransomware family dubbed Reynolds that comes embedded with a built-in bring your own vulnerable driver (BYOVD) component for defense eva ... Read more

Published Date: Feb 10, 2026 (1 week, 2 days ago)
  • The Hacker News
Warlock Ransomware Breaches SmarterTools Through Unpatched SmarterMail Server

SmarterTools confirmed last week that the Warlock (aka Storm-2603) ransomware gang breached its network by exploiting an unpatched SmarterMail instance. The incident took place on January 29, 2026, wh ... Read more

Published Date: Feb 10, 2026 (1 week, 2 days ago)
  • The Hacker News
Dutch Authorities Confirm Ivanti Zero-Day Exploit Exposed Employee Contact Data

The Netherlands' Dutch Data Protection Authority (AP) and the Council for the Judiciary confirmed both agencies (Rvdr) have disclosed that their systems were impacted by cyber attacks that exploited t ... Read more

Published Date: Feb 10, 2026 (1 week, 2 days ago)
  • The Hacker News
Fortinet Patches Critical SQLi Flaw Enabling Unauthenticated Code Execution

Fortinet has released security updates to address a critical flaw impacting FortiClientEMS that could lead to the execution of arbitrary code on susceptible systems. The vulnerability, tracked as CVE- ... Read more

Published Date: Feb 10, 2026 (1 week, 2 days ago)
  • The Hacker News
SolarWinds Web Help Desk Exploited for RCE in Multi-Stage Attacks on Exposed Servers

Microsoft has revealed that it observed a multi‑stage intrusion that involved the threat actors exploiting internet‑exposed SolarWinds Web Help Desk (WHD) instances to obtain initial access and move l ... Read more

Published Date: Feb 09, 2026 (1 week, 3 days ago)
  • The Hacker News
TeamPCP Worm Exploits Cloud Infrastructure to Build Criminal Infrastructure

Cybersecurity researchers have called attention to a "massive campaign" that has systematically targeted cloud native environments to set up malicious infrastructure for follow-on exploitation. The ac ... Read more

Published Date: Feb 09, 2026 (1 week, 3 days ago)
  • The Hacker News
BeyondTrust Fixes Critical Pre-Auth RCE Vulnerability in Remote Support and PRA

BeyondTrust has released updates to address a critical security flaw impacting Remote Support (RS) and Privileged Remote Access (PRA) products that, if successfully exploited, could result in remote c ... Read more

Published Date: Feb 09, 2026 (1 week, 3 days ago)
  • Help Net Security
February 2026 Patch Tuesday forecast: Lots of OOB love this month

Valentine’s Day is just around the corner and Microsoft has been giving us a lot of love with a non-stop supply of patches starting with January 2026 Patch Tuesday. The January releases addressed 92 v ... Read more

Published Date: Feb 06, 2026 (1 week, 6 days ago)
  • The Hacker News
ThreatsDay Bulletin: Codespaces RCE, AsyncRAT C2, BYOVD Abuse, AI Cloud Intrusions & 15+ Stories

This week didn’t produce one big headline. It produced many small signals — the kind that quietly shape what attacks will look like next.Researchers tracked intrusions that start in ordinary places: d ... Read more

Published Date: Feb 05, 2026 (2 weeks ago)
  • The Hacker News
Infy Hackers Resume Operations with New C2 Servers After Iran Internet Blackout Ends

The elusive Iranian threat group known as Infy (aka Prince of Persia) has evolved its tactics as part of efforts to hide its tracks, even as it readied new command-and-control (C2) infrastructure coin ... Read more

Published Date: Feb 05, 2026 (2 weeks ago)
  • The Hacker News
Critical n8n Flaw CVE-2026-25049 Enables System Command Execution via Malicious Workflows

A new, critical security vulnerability has been disclosed in the n8n workflow automation platform that, if successfully exploited, could result in the execution of arbitrary system commands. The flaw, ... Read more

Published Date: Feb 05, 2026 (2 weeks ago)
  • The Hacker News
Hackers Exploit React2Shell to Hijack Web Traffic via Compromised NGINX Servers

Cybersecurity researchers have disclosed details of an active web traffic hijacking campaign that has targeted NGINX installations and management panels like Baota (BT) in an attempt to route it throu ... Read more

Published Date: Feb 05, 2026 (2 weeks ago)
  • CybersecurityNews
Amaranth-Dragon Exploiting WinRAR Vulnerability to Gain Persistent to Victim Systems

A sophisticated cyber-espionage group known as Amaranth-Dragon has launched a series of highly targeted attacks against government and law enforcement agencies across Southeast Asia. Active throughout ... Read more

Published Date: Feb 05, 2026 (2 weeks ago)
  • Daily CyberSecurity
10 Days to Exploit: Amaranth-Dragon Weaponizes WinRAR Flaw to Spy on SE Asia

A new and relentless cyber-espionage campaign is sweeping across government and law enforcement agencies in Southeast Asia, driven by a threat group that wastes no time in weaponizing freshly disclose ... Read more

Published Date: Feb 05, 2026 (2 weeks ago)
  • The Hacker News
China-Linked Amaranth-Dragon Exploits WinRAR Flaw in Espionage Campaigns

Threat actors affiliated with China have been attributed to a fresh set of cyber espionage campaigns targeting government and law enforcement agencies across Southeast Asia throughout 2025. Check Poin ... Read more

Published Date: Feb 04, 2026 (2 weeks, 1 day ago)
  • The Hacker News
CISA Adds Actively Exploited SolarWinds Web Help Desk RCE to KEV Catalog

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday added a critical security flaw impacting SolarWinds Web Help Desk (WHD) to its Known Exploited Vulnerabilities (KEV) catalog ... Read more

Published Date: Feb 04, 2026 (2 weeks, 1 day ago)
  • The Hacker News
Hackers Exploit Metro4Shell RCE Flaw in React Native CLI npm Package

Threat actors have been observed exploiting a critical security flaw impacting the Metro Development Server in the popular "@react-native-community/cli" npm package. Cybersecurity company VulnCheck sa ... Read more

Published Date: Feb 03, 2026 (2 weeks, 2 days ago)
  • The Hacker News
APT28 Uses Microsoft Office CVE-2026-21509 in Espionage-Focused Malware Attacks

The Russia-linked state-sponsored threat actor known as APT28 (aka UAC-0001) has been attributed to attacks exploiting a newly disclosed security flaw in Microsoft Office as part of a campaign codenam ... Read more

Published Date: Feb 03, 2026 (2 weeks, 2 days ago)
  • europa.eu
Cyber Brief 26-02 - January 2026

Cyber Brief (January 2026)February 2, 2026 – Version: 1TLP:CLEARExecutive summaryWe analysed 268 open source reports for this Cyber Security Brief.1Relating to cyber policy, The European Commission pr ... Read more

Published Date: Feb 02, 2026 (2 weeks, 3 days ago)

The following table lists the changes that have been made to the CVE-2025-8088 vulnerability over time.

Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability's severity, exploitability, or other characteristics.

  • Modified Analysis by [email protected]

    Oct. 30, 2025

    Action Type Old Value New Value
    Added Reference Type CISA-ADP: https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-8088 Types: US Government Resource
  • CVE Modified by 134c704f-9b21-4f2e-91b3-4a467353bcc0

    Oct. 21, 2025

    Action Type Old Value New Value
    Added Reference https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-8088
  • CVE Modified by 134c704f-9b21-4f2e-91b3-4a467353bcc0

    Oct. 21, 2025

    Action Type Old Value New Value
    Removed Reference https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-8088
  • CVE Modified by 134c704f-9b21-4f2e-91b3-4a467353bcc0

    Oct. 21, 2025

    Action Type Old Value New Value
    Added Reference https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-8088
  • Modified Analysis by [email protected]

    Sep. 16, 2025

    Action Type Old Value New Value
    Added Reference Type CVE: https://arstechnica.com/security/2025/08/high-severity-winrar-0-day-exploited-for-weeks-by-2-groups/ Types: Press/Media Coverage
  • CVE Modified by af854a3a-2127-422b-91ae-364da2661108

    Sep. 15, 2025

    Action Type Old Value New Value
    Added Reference https://arstechnica.com/security/2025/08/high-severity-winrar-0-day-exploited-for-weeks-by-2-groups/
  • Modified Analysis by [email protected]

    Aug. 21, 2025

    Action Type Old Value New Value
    Added CPE Configuration AND OR *cpe:2.3:a:dtsearch:dtsearch:*:*:*:*:*:*:*:* versions up to (excluding) 2023.01 OR cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*
    Added Reference Type CVE: https://support.dtsearch.com/faq/dts0245.htm Types: Third Party Advisory
  • CVE Modified by af854a3a-2127-422b-91ae-364da2661108

    Aug. 21, 2025

    Action Type Old Value New Value
    Added Reference https://support.dtsearch.com/faq/dts0245.htm
  • Modified Analysis by [email protected]

    Aug. 18, 2025

    Action Type Old Value New Value
    Added Reference Type CVE: https://www.vicarius.io/vsociety/posts/cve-2025-8088-detect-winrar-zero-day Types: Third Party Advisory
    Added Reference Type CVE: https://www.vicarius.io/vsociety/posts/cve-2025-8088-mitigate-winrar-zero-day-using-srp-and-ifeo Types: Mitigation, Third Party Advisory
  • CVE Modified by af854a3a-2127-422b-91ae-364da2661108

    Aug. 15, 2025

    Action Type Old Value New Value
    Added Reference https://www.vicarius.io/vsociety/posts/cve-2025-8088-detect-winrar-zero-day
    Added Reference https://www.vicarius.io/vsociety/posts/cve-2025-8088-mitigate-winrar-zero-day-using-srp-and-ifeo
  • CVE Modified by [email protected]

    Aug. 15, 2025

    Action Type Old Value New Value
    Changed Description A path traversal vulnerability affecting the Windows version of WinRAR allows the attackers to execute arbitrary code by crafting malicious archive files. This vulnerability was exploited in the wild and was discovered by Anton Cherepanov, Peter Košinár, and Peter Strý?ek from ESET. A path traversal vulnerability affecting the Windows version of WinRAR allows the attackers to execute arbitrary code by crafting malicious archive files. This vulnerability was exploited in the wild and was discovered by Anton Cherepanov, Peter Košinár, and Peter Strýček from ESET.
  • Initial Analysis by [email protected]

    Aug. 13, 2025

    Action Type Old Value New Value
    Added CVSS V3.1 AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
    Added CPE Configuration AND OR *cpe:2.3:a:rarlab:winrar:*:*:*:*:*:*:*:* versions up to (excluding) 7.13 OR cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*
    Added Reference Type ESET: https://www.win-rar.com/singlenewsview.html?&L=0&tx_ttnews%5Btt_news%5D=283&cHash=a64b4a8f662d3639dec8d65f47bc93c5 Types: Release Notes
    Added Reference Type CISA-ADP: https://www.welivesecurity.com/en/eset-research/update-winrar-tools-now-romcom-and-others-exploiting-zero-day-vulnerability/#the-discovery-of-cve-2025-8088 Types: Press/Media Coverage
  • CVE CISA KEV Update by 9119a7d8-5eab-497f-8521-727c672e3725

    Aug. 13, 2025

    Action Type Old Value New Value
    Added Date Added 2025-08-12
    Added Due Date 2025-09-02
    Added Required Action Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
    Added Vulnerability Name RARLAB WinRAR Path Traversal Vulnerability
  • CVE Modified by 134c704f-9b21-4f2e-91b3-4a467353bcc0

    Aug. 12, 2025

    Action Type Old Value New Value
    Added Reference https://www.welivesecurity.com/en/eset-research/update-winrar-tools-now-romcom-and-others-exploiting-zero-day-vulnerability/#the-discovery-of-cve-2025-8088
  • New CVE Received by [email protected]

    Aug. 08, 2025

    Action Type Old Value New Value
    Added Description A path traversal vulnerability affecting the Windows version of WinRAR allows the attackers to execute arbitrary code by crafting malicious archive files. This vulnerability was exploited in the wild and was discovered by Anton Cherepanov, Peter Košinár, and Peter Strýček from ESET.
    Added CVSS V4.0 AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
    Added CWE CWE-35
    Added Reference https://www.win-rar.com/singlenewsview.html?&L=0&tx_ttnews%5Btt_news%5D=283&cHash=a64b4a8f662d3639dec8d65f47bc93c5
EPSS is a daily estimate of the probability of exploitation activity being observed over the next 30 days. Following chart shows the EPSS score history of the vulnerability.
Vulnerability Scoring Details
Base CVSS Score: 8.4
Attack Vector
Attack Complexity
Attack Requirements
Privileges Required
User Interaction
VS Confidentiality
VS Integrity
VS Availability
SS Confidentiality
SS Integrity
SS Availability
Base CVSS Score: 8.8
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact