Introduction

A critical zero-day vulnerability in WinRAR, CVE‑2025‑8088, is being actively exploited. Users are urged to update to WinRAR 7.13 immediately.

What’s the Vulnerability?

  • Type: Directory traversal
  • Mechanism: Malicious RAR files abuse extraction paths
  • Affected: Windows versions of WinRAR, UnRAR.dll, RAR
  • Not Affected: Unix and Android versions
  • Severity: High (CVSS ~8.8)

Who’s Exploiting It?

  • RomCom – Russia-aligned group using RAR archives in phishing campaigns.
  • Paper Werewolf (GOFFEE) – Also linked to previous WinRAR CVEs and ongoing campaigns.

Why This Matters

  • Enables automatic malware execution by writing files to Startup folders.
  • Phishing emails disguised as resumes or reports trick users easily.
  • WinRAR has a history of similar vulnerabilities (e.g., CVE‑2023‑38831).

Mitigations & Recommendations

  1. Update now to WinRAR version 7.13 (manual update required).
  2. Beware of RAR attachments from unknown sources.
  3. Use endpoint protection to detect malicious payloads.
  4. Train users on phishing awareness and safe archive handling.

Key Details Snapshot

Detail Description
CVE CVE‑2025‑8088
Risk Type Path traversal
Severity High (CVSS ~8.8)
Impact Malware execution via Startup folders
Affected WinRAR (Windows), UnRAR.dll
Fixed In WinRAR 7.13
Active Exploitation Yes
Attack Vectors Phishing with RAR attachments

Need Support or More Info?

Contact us for tailored cybersecurity support.