โ† Back to Portfolio

CVE-2025-8088 โ€“ WinRAR Path Traversal

Published: 17 August 2025 โ€ข Tags: Path Traversal, WinRAR, Blog

๐Ÿ”Ž Overview: CVE-2025-8088 is a critical path traversal vulnerability in WinRAR v7.12 that can be exploited by creating specially crafted archives. This allows attackers to place malicious files in sensitive directories such as the Windows Startup folder, leading to code execution on system boot.

๐Ÿง  Summary:

About the vulnerability:

CVE-2025-8088 is a path traversal flaw in WinRAR. It allows a specially crafted .rar file to place files outside the intended extraction folder including in sensitive locations like " %AppData%\Microsoft\Windows\Start Menu\Programs\Startup ". The vulnerability, tracked as CVE-2025-8088, uses alternate data streams (ADSes) for path traversal. Note that a similar path traversal vulnerability (CVEโ€‘2025โ€‘6218) affecting WinRAR was disclosed on June 19th, 2025, approximately a month earlier.

I tested this CVE on a Windows 10 virtual machine running inside VMware with WinRAR 7.12. To simulate real-world conditions. And used a python based script to create a malicious .rar (You can find it below References section - Thanks jordan).

๐Ÿงจ PoC (Proof of Concept):

๐Ÿ’ฅ Impact:

A successful attack allows remote code execution with the privileges of the victim user. By targeting the Startup folder, persistence is achieved, enabling execution on every system boot. While AV solutions may catch this through behavioral monitoring, the technique demonstrates how password-protected archives still pose risks.

๐Ÿ›ก๏ธ Mitigation:

๐Ÿ“Ž References and Credits: