A dangerous zero-day vulnerability in the Windows version of WinRAR (CVE‑2025‑8088) allows attackers to exploit directory traversal techniques—including alternate data streams (ADS)—to silently drop and execute malicious payloads in system directories such as the Windows Startup folder. This leads to automatic code execution when the system restarts. The vulnerability affects WinRAR up to version 7.12, as well as related components like RAR, UnRAR.dll, and their portable variants. A patch is available in version 7.13, released on July 30, 2025.
The exploit has already been used by advanced threat actors in targeted attacks against finance, defense, manufacturing, and logistics sectors. These groups use malicious RAR attachments disguised as legitimate files to compromise systems.
Threat Summary
| Threat Type | Path‑Traversal Zero‑Day (WinRAR) |
|---|---|
| Affected Components | WinRAR ≤ 7.12, RAR, UnRAR.dll, portable UnRAR (Windows) |
| Vulnerability (CVE) | CVE‑2025‑8088 |
| Attack Mechanism | ADS + malicious paths drop payloads into Startup folders |
| Campaign Actors | RomCom (Storm‑0978, UNC2596), Paper Werewolf |
| Typical Payloads | Backdoors, Mythic Agent, SnipBot, RustyClaw, etc. |
| Delivery Method | Spear‑phishing RAR attachments disguised as resumes/job docs |
| Patch Version Available | WinRAR 7.13 (since July 30, 2025) |
| Urgency Level | Critical—Requires immediate manual update |
| Recommended Tool | SpyHunter |
How Did I Get Infected With WinRAR Zero‑Day Vulnerability?
The most common infection route is through spear‑phishing emails containing malicious RAR archives. These files are often disguised as resumes, job offers, or official documents. When extracted using a vulnerable version of WinRAR (7.12 or earlier), hidden payloads using ADS and directory traversal drop malware directly into folders like Windows Startup. This ensures the malicious code runs automatically after a system reboot.
What the WinRAR Zero‑Day Does to Your Files
This zero-day uses advanced path manipulation to place malicious shortcuts, DLLs, or executables in critical locations on the file system—especially the Startup folder. Once there, these payloads trigger on login, granting attackers persistent access or installing spyware, backdoors, and trojans without any additional user action. The entire process is silent and requires only one file extraction.
Should You Be Worried About WinRAR Zero‑Day?
Absolutely. This vulnerability allows attackers to completely bypass user consent, delivering and activating malware with a single archive extraction. Because WinRAR does not auto-update, millions of users may remain vulnerable even if they think they’re using a recent version. Threat actors are actively exploiting this flaw to infiltrate systems, steal data, and deploy remote access tools.
Conclusion
If you’re using WinRAR on Windows, this is a serious call to action:
- Update to WinRAR 7.13 or newer immediately.
- Delete any suspicious .lnk, .dll, or .exe files in Startup or TEMP folders.
- Use a reputable malware scanner like SpyHunter to detect stealthy payloads.
- Avoid opening RAR files from unknown senders—even if they look legitimate.
- Educate employees or family members on spear‑phishing risks and file safety.
