RARLAB WinRAR Directory Traversal Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of RARLAB WinRAR. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the handling of file paths within archive files. A crafted file path can cause the process to traverse to unintended directories. An attacker can leverage this vulnerability to execute code in the context of the current user. Was ZDI-CAN-27198.
References
| Link | Resource |
|---|---|
| https://www.win-rar.com/singlenewsview.html?&tx_ttnews%5Btt_news%5D=276&cHash=388885bd3908a40726f535c026f94eb6 | Release Notes |
| https://www.zerodayinitiative.com/advisories/ZDI-25-409/ | Third Party Advisory VDB Entry |
| https://foresiet.com/blog/apt-c-08-winrar-directory-traversal-exploit/ | Exploit Third Party Advisory |
| https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-6218 | US Government Resource |
| https://www.secpod.com/blog/archive-terror-dissecting-the-winrar-cve-2025-6218-exploit-apt-c-08s-stealth-move/ | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
| AND |
|
History
10 Dec 2025, 13:48
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://foresiet.com/blog/apt-c-08-winrar-directory-traversal-exploit/ - Exploit, Third Party Advisory | |
| References | () https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-6218 - US Government Resource | |
| References | () https://www.secpod.com/blog/archive-terror-dissecting-the-winrar-cve-2025-6218-exploit-apt-c-08s-stealth-move/ - Exploit, Third Party Advisory |
09 Dec 2025, 19:15
| Type | Values Removed | Values Added |
|---|---|---|
| Summary | (es) Vulnerabilidad de ejecución remota de código por Directory Traversal en RARLAB WinRAR. Esta vulnerabilidad permite a atacantes remotos ejecutar código arbitrario en las instalaciones afectadas de RARLAB WinRAR. Para explotar esta vulnerabilidad, se requiere la interacción del usuario, ya que el objetivo debe visitar una página maliciosa o abrir un archivo malicioso. La falla específica se encuentra en la gestión de rutas de archivo dentro de los archivos comprimidos. Una ruta de archivo manipulada puede provocar que el proceso acceda a directorios no deseados. Un atacante puede aprovechar esta vulnerabilidad para ejecutar código en el contexto del usuario actual. Era ZDI-CAN-27198. | |
| References |
|
25 Jun 2025, 19:03
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://www.win-rar.com/singlenewsview.html?&tx_ttnews%5Btt_news%5D=276&cHash=388885bd3908a40726f535c026f94eb6 - Release Notes | |
| References | () https://www.zerodayinitiative.com/advisories/ZDI-25-409/ - Third Party Advisory, VDB Entry | |
| First Time |
Microsoft
Microsoft windows Rarlab winrar Rarlab |
|
| CPE | cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:* cpe:2.3:a:rarlab:winrar:*:*:*:*:*:*:*:* |
23 Jun 2025, 20:16
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
21 Jun 2025, 01:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-06-21 01:15
Updated : 2025-12-10 13:48
NVD link : CVE-2025-6218
Mitre link : CVE-2025-6218
CVE.ORG link : CVE-2025-6218
JSON object : View
Products Affected
rarlab
- winrar
microsoft
- windows
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
