RCE via Path Traversal in WinRAR Windows
CVE-2025-8088 Published on August 8, 2025
Path traversal vulnerability in WinRAR
A path traversal vulnerability affecting the Windows version of WinRAR allows the attackers to execute arbitrary code by crafting malicious archive files. This vulnerability was exploited in the wild and was discovered by Anton Cherepanov, Peter Koinár, and Peter Strýek
from ESET.
Known Exploited Vulnerability
This RARLAB WinRAR Path Traversal Vulnerability is part of CISA's list of Known Exploited Vulnerabilities. RARLAB WinRAR contains a path traversal vulnerability affecting the Windows version of WinRAR. This vulnerability could allow an attacker to execute arbitrary code by crafting malicious archive files.
The following remediation steps are recommended / required by September 2, 2025: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
Weakness Type
Path Traversal: '.../...//'
The software uses external input to construct a pathname that should be within a restricted directory, but it does not properly neutralize '.../...//' (doubled triple dot slash) sequences that can resolve to a location that is outside of that directory.
Products Associated with CVE-2025-8088
Want to know whenever a new CVE is published for Rarlab Winrar? stack.watch will email you.
Affected Versions
win.rar GmbH WinRAR:- Before and including 7.12 is affected.
Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.