{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2025-8088","assignerOrgId":"4a9b9929-2450-4021-b7b9-469a0255b215","state":"PUBLISHED","assignerShortName":"ESET","dateReserved":"2025-07-23T15:35:47.170Z","datePublished":"2025-08-08T11:11:41.842Z","dateUpdated":"2026-02-26T17:49:47.133Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unknown","platforms":["Windows"],"product":"WinRAR","vendor":"win.rar GmbH","versions":[{"lessThanOrEqual":"7.12","status":"affected","version":"0","versionType":"custom"}]}],"descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"A path traversal vulnerability affecting the Windows version of WinRAR allows the attackers to execute arbitrary code by crafting malicious archive files. This vulnerability was exploited in the wild and was discovered by&nbsp;Anton Cherepanov, Peter Košinár, and Peter Strýček\n     from ESET."}],"value":"A path traversal vulnerability affecting the Windows version of WinRAR allows the attackers to execute arbitrary code by crafting malicious archive files. This vulnerability was exploited in the wild and was discovered by Anton Cherepanov, Peter Košinár, and Peter Strýček\n     from ESET."}],"impacts":[{"capecId":"CAPEC-549","descriptions":[{"lang":"en","value":"CAPEC-549 Local Execution of Code"}]}],"metrics":[{"cvssV4_0":{"Automatable":"NOT_DEFINED","Recovery":"NOT_DEFINED","Safety":"NOT_DEFINED","attackComplexity":"LOW","attackRequirements":"NONE","attackVector":"LOCAL","baseScore":8.4,"baseSeverity":"HIGH","privilegesRequired":"NONE","providerUrgency":"NOT_DEFINED","subAvailabilityImpact":"NONE","subConfidentialityImpact":"NONE","subIntegrityImpact":"NONE","userInteraction":"ACTIVE","valueDensity":"NOT_DEFINED","vectorString":"CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N","version":"4.0","vulnAvailabilityImpact":"HIGH","vulnConfidentialityImpact":"HIGH","vulnIntegrityImpact":"HIGH","vulnerabilityResponseEffort":"NOT_DEFINED"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-35","description":"CWE-35 Path traversal","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"4a9b9929-2450-4021-b7b9-469a0255b215","shortName":"ESET","dateUpdated":"2025-08-08T11:11:41.842Z"},"references":[{"url":"https://www.win-rar.com/singlenewsview.html?&L=0&tx_ttnews%5Btt_news%5D=283&cHash=a64b4a8f662d3639dec8d65f47bc93c5"}],"source":{"discovery":"UNKNOWN"},"title":"Path traversal vulnerability in WinRAR","x_generator":{"engine":"Vulnogram 0.2.0"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"id":"CVE-2025-8088","role":"CISA Coordinator","options":[{"Exploitation":"active"},{"Automatable":"no"},{"Technical Impact":"total"}],"version":"2.0.3","timestamp":"2025-08-12T03:55:17.302460Z"}}},{"other":{"type":"kev","content":{"dateAdded":"2025-08-12","reference":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-8088"}}}],"references":[{"url":"https://www.welivesecurity.com/en/eset-research/update-winrar-tools-now-romcom-and-others-exploiting-zero-day-vulnerability/#the-discovery-of-cve-2025-8088","tags":["technical-description"]},{"url":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-8088","tags":["government-resource"]}],"timeline":[{"time":"2025-08-12T00:00:00.000Z","lang":"en","value":"CVE-2025-8088 added to CISA KEV"}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-02-26T17:49:47.133Z"}},{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2025-09-15T13:59:50.848Z"},"references":[{"url":"https://www.vicarius.io/vsociety/posts/cve-2025-8088-detect-winrar-zero-day"},{"url":"https://www.vicarius.io/vsociety/posts/cve-2025-8088-mitigate-winrar-zero-day-using-srp-and-ifeo"},{"url":"https://support.dtsearch.com/faq/dts0245.htm"},{"url":"https://arstechnica.com/security/2025/08/high-severity-winrar-0-day-exploited-for-weeks-by-2-groups/"}],"title":"CVE Program Container","x_generator":{"engine":"ADPogram 0.0.1"}}]}}