Skip to content

CVE-2025-8088: WinRAR Path Traversal Vulnerability

CVE-2025-8088 is a critical path traversal vulnerability affecting Windows versions of WinRAR prior to 7.13. It allows attackers to execute arbitrary code on the victim’s system by manipulating archive file structures. This vulnerability is actively exploited by threat actors.

The flaw resides in how WinRAR handles path resolution during archive extraction. An attacker can craft an archive that forces the extraction of files outside the intended destination directory. By placing a malicious executable in a startup folder or overwriting existing binaries, the attacker achieves code execution upon user interaction or system event.

  1. An attacker distributes a malicious archive file.
  2. The user extracts the file using a vulnerable version of WinRAR (< 7.13).
  3. The path traversal mechanism writes an attacker-controlled file to a sensitive location.
  4. The file is executed, granting the attacker a foothold on the system.

When investigating a potential compromise involving CVE-2025-8088, focus on artifacts that track file execution and directory traversal. Correlate these with WinRAR activity:

  • UserAssist: Review registry keys for WinRAR execution history to confirm the application was launched shortly before the suspicious file activity.
  • Jumplists: Examine Jumplist entries for WinRAR to identify recently opened archive files that could be the malicious vectors.
  • Shellbags: Analyze Shellbags to track directory access history, focusing on folders where unexpected files appeared after WinRAR operations.
  • Prefetch/Shimcache: Correlate execution timestamps with files created during the WinRAR extraction process.
  • Threat Hunting Query: Identify endpoints running WinRAR.exe versions < 7.13.
  • IOCs: Inspect archives for non-standard path characters (e.g., ../, ..) that may indicate traversal attempts.

Update WinRAR to version 7.13 or higher immediately.