CVE-2025-52331

Cross-site scripting (XSS) vulnerability in the generate report functionality in Rarlab WinRAR 7.11, allows attackers to disclose user information such as the computer username, generated report directory, and IP address. The generate report command includes archived file names without validation in the HTML report, which allows potentially malicious HTML tags to be injected into the report. User interaction is required. User must use the "generate report" functionality and open the report.
Configurations

Configuration 1 (hide)

cpe:2.3:a:rarlab:winrar:7.11:-:*:*:*:*:*:*

History

31 Dec 2025, 16:39

Type Values Removed Values Added
First Time Rarlab
Rarlab winrar
References () https://gist.github.com/MarcinB44/2150484497c4b34aedf682c9091b14fa - () https://gist.github.com/MarcinB44/2150484497c4b34aedf682c9091b14fa - Third Party Advisory
References () https://www.rarlab.com/rarnew.htm - () https://www.rarlab.com/rarnew.htm - Release Notes
References () https://www.win-rar.com/whatsnew.html - () https://www.win-rar.com/whatsnew.html - Release Notes
CPE cpe:2.3:a:rarlab:winrar:7.11:-:*:*:*:*:*:*

12 Nov 2025, 22:15

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 6.1
CWE CWE-79

12 Nov 2025, 17:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-11-12 17:15

Updated : 2025-12-31 16:39


NVD link : CVE-2025-52331

Mitre link : CVE-2025-52331

CVE.ORG link : CVE-2025-52331


JSON object : View

Products Affected

rarlab

  • winrar
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')