🟢 CVE-2025-8088

CVE-2025-8088 is a path traversal vulnerability in WinRAR that allows arbitrary code execution through malicious archive files. This requires user interaction to open/extract crafted archives and is not directly exploitable over the internet against public-facing services.

← Back to Overview
LOW_RISK
Risk Level
T1566
MITRE Technique
8.4
CVSS Score
LOCAL
Attack Vector
VERY_LOW
Deployment Risk

📋 Vulnerability Details

Data Source: CIRCL

Confidence: HIGH

Exploitation Method: USER_INTERACTION

CVE Published: 2025-08-08

Added to CISA KEV: 2025-08-12 4 DAYS BETWEEN CVE AND KEV

🎯 Recommendations:

🔍 Web Intelligence

Key Sources:

  • GitHub - sxyrxyy/CVE-2025-8088-WinRAR-Proof...

    CVE-2025-8088 WinRAR Proof of Concept (PoC-Exploit).This repository contains a Proof of Concept (PoC) script for CVE-2025-8088, a path traversal vulnerability in WinRAR versions up to 7.12.

  • Our Blog - Greenbone

    CVE-2025-8088 (CVSS 8.4) is a new high-risk path traversal vulnerability [CWE-35] in WinRAR versions 7.12 and below and related components including UnRAR.dll.

  • Details emerge on WinRAR zero-day attacks that ... - BleepingComputer

    Researchers have released a report detailing how a recent WinRAR path traversal vulnerability tracked as CVE-2025-8088 was exploited in zero-day attacks by the Russian 'RomCom' hacking group to ...

  • WinRAR zero-day exploited to plant malware on archive extraction

    A recently fixed WinRAR vulnerability tracked as CVE-2025-8088 was exploited as a zero-day in phishing attacks to install the RomCom malware.These archives exploited the CVE-2025-8088 to deliver RomCom backdoors. RomCom is a Russia-aligned group."

  • A path traversal vulnerability affecting the Windows...

    Exploitability Metrics. Attack Vector: This metric reflects the context by which vulnerability exploitation is possible. This metric value (and consequently the resulting severity) will be larger the more remote (logically, and physically) an attacker can be in order to exploit the...