WinRAR: Code smuggling vulnerability is being attacked

This summer, a WinRAR update closed a security vulnerability that allowed code smuggling. It is now being attacked.

listen Print view
Attention sign next to WinRAR logo on a Matrix-rain background

(Image: heise online / dmk)

2 min. read

A security vulnerability in the WinRAR compression program, present until version 7.12 Beta 1, allows attackers to inject malicious code. Attacks exploiting this vulnerability have now been observed. Users of WinRAR should therefore update to a newer version promptly.

The US cybersecurity agency CISA added the WinRAR vulnerability to its catalog of Known Exploited Vulnerabilities on Wednesday night, a collection of known attacked security flaws. The vulnerability became known towards the end of June this year, when WinRAR closed it in version 7.12b1.

WinRAR described the security vulnerability: "When extracting files, WinRAR, RAR, UnRAR, portable UnRAR, and UnRAR.dll can be made to use a path specified in a manipulated archive instead of a user-specified path." The Zero-Day Initiative (ZDI) from Trend Micro, however, clarified: "The specific flaw lies in how paths within archive files are handled. A crafted file path can cause the process to traverse into unintended directories. Attackers can exploit this to execute malicious code in the context of the current user" (CVE-2025-6218, CVSS 7.8, Risk "high").

Videos by heise

Neither Rarlabs nor ZDI specify which file types are affected. However, attackers can apparently exploit this with manipulated files – and are doing so. CISA does not reveal what the attacks look like or their extent. Therefore, there are no indications on how to find out if you are affected. In any case, updating to a newer version of the compression program for Windows provides a solution.

On the WinRAR download page, the current stable version available for download is WinRAR 7.13. Users of WinRAR should use at least version 7.12b1, or preferably the current stable version.

(dmk)

Don't miss any news – follow us on Facebook, LinkedIn or Mastodon.

This article was originally published in German. It was translated with technical assistance and editorially reviewed before publication.