Directory traversal flaw in WinRAR enables remote code execution
Take action: If you use WinRAR on Windows, be very cautious of unexpected RAR attachments and never download files from pirated or untrusted sources. Check for the next stable release of WinRAR and update when it's released.
Learn More
RARLAB has patched a security vulnerability in WinRAR, that allows attackers to execute malicious code by exploiting the software's file extraction path handling mechanism. T
The vulnerability is tracked as CVE-2025-6218 (CVSS score 7.8) and is caused by improper handling of file extraction paths within archive files. When extracting files, WinRAR can be manipulated to use a path specified within a specially crafted archive instead of the user-specified path. It allows attackers to redirect the extraction process to unintended directories, executing maliciosu code in the context of the affected user.
To exploit this flaw, the target must visit a malicious webpage or open a specially crafted archive file. This is usuall achieved through social engineering, phishing or offering "free" pirated software for download.
The vulnerability affects all Windows versions of WinRAR prior to version 7.12 Beta 1
- All Windows iterations of WinRAR before version 7.12b1
- Windows versions of RAR, UnRAR, and portable UnRAR source code
- UnRAR.dll library for Windows
The vulnerability does not affect Unix versions of RAR, UnRAR, portable UnRAR source code, UnRAR library, or RAR for Android. Us