RARLAB WinRAR Directory Traversal Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of RARLAB WinRAR. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the handling of file paths within archive files. A crafted file path can cause the process to traverse to unintended directories. An attacker can leverage this vulnerability to execute code in the context of the current user. Was ZDI-CAN-27198.
Metrics
Affected Vendors & Products
References
History
Wed, 25 Jun 2025 19:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Microsoft
Microsoft windows Rarlab Rarlab winrar |
|
CPEs | cpe:2.3:a:rarlab:winrar:*:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:* |
|
Vendors & Products |
Microsoft
Microsoft windows Rarlab Rarlab winrar |
Mon, 23 Jun 2025 21:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Sat, 21 Jun 2025 00:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | RARLAB WinRAR Directory Traversal Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of RARLAB WinRAR. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of file paths within archive files. A crafted file path can cause the process to traverse to unintended directories. An attacker can leverage this vulnerability to execute code in the context of the current user. Was ZDI-CAN-27198. | |
Title | RARLAB WinRAR Directory Traversal Remote Code Execution Vulnerability | |
Weaknesses | CWE-22 | |
References |
| |
Metrics |
cvssV3_0
|

Status: PUBLISHED
Assigner: zdi
Published: 2025-06-21T00:09:02.884Z
Updated: 2025-06-23T20:15:40.017Z
Reserved: 2025-06-17T21:51:12.763Z
Link: CVE-2025-6218

Updated: 2025-06-23T20:14:22.300Z

Status : Analyzed
Published: 2025-06-21T01:15:29.123
Modified: 2025-06-25T19:03:33.817
Link: CVE-2025-6218

No data.