8.8 CVE-2025-8088

Enriched by CISA CISA Kev Catalog Exploit
 

A path traversal vulnerability affecting the Windows version of WinRAR allows the attackers to execute arbitrary code by crafting malicious archive files. This vulnerability was exploited in the wild and was discovered by Anton Cherepanov, Peter Košinár, and Peter Strýček from ESET.
https://nvd.nist.gov/vuln/detail/CVE-2025-8088

Categories

CWE-35 : Path Traversal: '.../...//'
The product uses external input to construct a pathname that should be within a restricted directory, but it does not properly neutralize '.../...//' (doubled triple dot slash) sequences that can resolve to a location that is outside of that directory. Automated static analysis, commonly referred to as Static Application Security Testing (SAST), can find some instances of this weakness by analyzing source code (or binary/compiled code) without having to execute it. Typically, this is done by building a model of data flow and control flow, then searching for potentially-vulnerable patterns that connect "sources" (origins of input) with "sinks" (destinations where the data interacts with external components, a lower layer such as the OS, etc.) Inputs should be decoded and canonicalized to the application's current internal representation before being validated (CWE-180). Make sure that the application does not decode the same input twice (CWE-174). Such errors could be used to bypass allowlist validation schemes by introducing dangerous inputs after they have been checked. chain: ".../...//" bypasses protection mechanism using regexp's that remove "../" resulting in collapse into an unsafe value "../" (CWE-182) and resultant path traversal. ".../....///" bypasses regexp's that remove "./" and "../"

References


 

AFFECTED (from MITRE)


Vendor Product Versions
win.rar GmbH WinRAR
  • ≤ 7.12 [affected]
© 2022 The MITRE Corporation. This work is reproduced and distributed with the permission of The MITRE Corporation.

CPE

cpe start end
Configuration 1
AND
   cpe:2.3:a:rarlab:winrar:*:*:*:*:*:*:*:* < 7.13
  Running on/with
  cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*
Configuration 2
AND
   cpe:2.3:a:dtsearch:dtsearch:*:*:*:*:*:*:*:* < 2023.01
  Running on/with
  cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*


REMEDIATION




EXPLOITS


Exploit-db.com

id description date
No known exploits

POC Github

Url
https://github.com/sxyrxyy/CVE-2025-8088-WinRAR-Proof-of-Concept-PoC-Exploit-
https://github.com/pentestfunctions/CVE-2025-8088-Multi-Document
https://github.com/pexlexity/WinRAR-CVE-2025-8088-Path-Traversal-PoC
https://github.com/DeepBlue-dot/CVE-2025-8088-WinRAR-Startup-PoC
https://github.com/pentestfunctions/best-CVE-2025-8088
https://github.com/hexsecteam/CVE-2025-8088-Winrar-Tool
https://github.com/tartalu/CVE-2025-8088
https://github.com/techcorp/CVE-2025-8088-Exploit
https://github.com/m4nbun/CVE-2025-8088
https://github.com/kyomber/CVE-2025-8088
https://github.com/haspread/CVE-2025-8088
https://github.com/tookATE/CVE-2025-8088
https://github.com/blowrrr/cve-2025-8088
https://github.com/papcaii2004/CVE-2025-8088-WinRAR-builder
https://github.com/kaucent/CVE-2025-8088

Other Nist (github, ...)

Url
No known exploits


CAPEC


Common Attack Pattern Enumerations and Classifications

id description severity
No entry