RCE via Path Traversal in WinRAR Windows
CVE-2025-8088 Published on August 8, 2025

Path traversal vulnerability in WinRAR
A path traversal vulnerability affecting the Windows version of WinRAR allows the attackers to execute arbitrary code by crafting malicious archive files. This vulnerability was exploited in the wild and was discovered by Anton Cherepanov, Peter Koinár, and Peter Strýek from ESET.

NVD

Known Exploited Vulnerability

This RARLAB WinRAR Path Traversal Vulnerability is part of CISA's list of Known Exploited Vulnerabilities. RARLAB WinRAR contains a path traversal vulnerability affecting the Windows version of WinRAR. This vulnerability could allow an attacker to execute arbitrary code by crafting malicious archive files.

The following remediation steps are recommended / required by September 2, 2025: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

Weakness Type

Path Traversal: '.../...//'

The software uses external input to construct a pathname that should be within a restricted directory, but it does not properly neutralize '.../...//' (doubled triple dot slash) sequences that can resolve to a location that is outside of that directory.


Products Associated with CVE-2025-8088

Want to know whenever a new CVE is published for Rarlab Winrar? stack.watch will email you.

 

Affected Versions

win.rar GmbH WinRAR:

Exploit Probability

EPSS
6.77%
Percentile
91.19%

EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.