RARLAB WinRAR Directory Traversal Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of RARLAB WinRAR. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the handling of file paths within archive files. A crafted file path can cause the process to traverse to unintended directories. An attacker can leverage this vulnerability to execute code in the context of the current user. Was ZDI-CAN-27198.
Metrics
Affected Vendors & Products
References
History
Sat, 21 Jun 2025 00:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | RARLAB WinRAR Directory Traversal Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of RARLAB WinRAR. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of file paths within archive files. A crafted file path can cause the process to traverse to unintended directories. An attacker can leverage this vulnerability to execute code in the context of the current user. Was ZDI-CAN-27198. | |
Title | RARLAB WinRAR Directory Traversal Remote Code Execution Vulnerability | |
Weaknesses | CWE-22 | |
References |
| |
Metrics |
cvssV3_0
|

Status: PUBLISHED
Assigner: zdi
Published: 2025-06-21T00:09:02.884Z
Updated: 2025-06-21T00:09:02.884Z
Reserved: 2025-06-17T21:51:12.763Z
Link: CVE-2025-6218

No data.

Status : Received
Published: 2025-06-21T01:15:29.123
Modified: 2025-06-21T01:15:29.123
Link: CVE-2025-6218

No data.