Advisory Details

June 19th, 2025

RARLAB WinRAR Directory Traversal Remote Code Execution Vulnerability

ZDI-25-409
ZDI-CAN-27198

CVE ID CVE-2025-6218
CVSS SCORE 7.8, AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
AFFECTED VENDORS RARLAB
AFFECTED PRODUCTS WinRAR
VULNERABILITY DETAILS

This vulnerability allows remote attackers to execute arbitrary code on affected installations of RARLAB WinRAR. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.

The specific flaw exists within the handling of file paths within archive files. A crafted file path can cause the process to traverse to unintended directories. An attacker can leverage this vulnerability to execute code in the context of the current user.

ADDITIONAL DETAILS RARLAB has issued an update to correct this vulnerability. More details can be found at:
https://www.win-rar.com/singlenewsview.html?&tx_ttnews%5Btt_news%5D=276&cHash=388885bd3908a40726f535c026f94eb6
DISCLOSURE TIMELINE
  • 2025-06-05 - Vulnerability reported to vendor
  • 2025-06-19 - Coordinated public release of advisory
  • 2025-06-19 - Advisory Updated
CREDIT whs3-detonator
BACK TO ADVISORIES