WinRAR Vulnerability Allowed Malware Execution During Archive Extraction

WinRAR Vulnerability Allowed Malware Execution During Archive Extraction

A critical path traversal vulnerability (CVE-2025-6218) in WinRAR has been patched after researchers discovered it could allow malware to execute automatically when extracting archives. The flaw received a CVSS score of 7.8 and was reported by security researcher whs3-detonator through Zero Day Initiative in early June 2025.

Affected Versions & Fix

  • Impacted: Windows versions of WinRAR 7.11 and later
  • Fixed in: WinRAR 7.12 beta 1 (released this week)

How the Exploit Worked

  • A maliciously crafted RAR archive could override user-specified extraction paths using a manipulated relative path.
  • This allowed files to be extracted into system directories or auto-start folders (e.g., Startup).
  • If the extracted files were malware, they could execute automatically upon the next Windows login.

Potential Risks

While the malware would run with user-level privileges (not admin/SYSTEM), it could still:

  • Steal browser cookies, saved passwords, and sensitive data
  • Establish persistence on the victim’s system
  • Provide attackers with remote access

Additional Fix: HTML Injection Flaw

WinRAR 7.12 beta 1 also patched an HTML injection vulnerability in report generation, reported by researcher Marcin Bobryk.

  • Archive filenames containing < or > could be interpreted as raw HTML tags in reports.
  • If opened in a browser, this could lead to HTML/JS injection attacks.

Recommendation

Users should update to WinRAR 7.12 beta 1 or later immediately to mitigate these risks.


Key Points:

  • CVE-2025-6218 allowed malware execution via archive extraction.
  • Malicious archives could force files into autostart locations.
  • Fixed in WinRAR 7.12 beta 1 (older versions remain vulnerable).
  • Secondary patch prevents HTML injection in reports.
  • No admin rights needed—malware could still steal data or enable remote access.

Read more