top of page
perceptive_background_267k.jpg

RARLAB WinRAR contains a path traversal vulnerability allowing an attacker to execute code in the context of the current user.

Published:

9 December 2025 at 00:00:00

Alert date:

9 December 2025 at 20:01:36

Source:

cisa.gov

Click to open the original link from this advisory

RARLAB WinRAR contains a path traversal vulnerability identified as CVE-2025-6218. This security flaw allows attackers to execute arbitrary code in the context of the current user through path traversal exploitation. The vulnerability affects WinRAR software and has been assigned a high criticality rating. Details are available through CISA's National Vulnerability Database and RARLAB's official security advisory. Organizations using WinRAR should prioritize patching this vulnerability due to its potential for code execution.

Technical details

Mitigation steps:

Affected products:

WinRAR

Related links:

Related CVE's:

Related threat actors:

IOC's:

This article was created with the assistance of AI technology by Perceptive.

© 2025 by Perceptive Security. All rights reserved.

email: info@perceptivesecurity.com

Disclaimer: Deze website toont informatie afkomstig van externe bronnen. Perceptive aanvaardt geen verantwoordelijkheid voor de inhoud, juistheid of volledigheid van deze informatie.

bottom of page