RARLAB WinRAR < 7.13 Directory Traversal (CVE-2025-8088)

high Nessus Plugin ID 248462

Synopsis

The remote Windows host has an application installed which is affected by a directory traversal vulnerability.

Description

The remote host is running RARLAB WinRAR, an archive manager for Windows, whose reported version is prior to 7.13. It is, therefore, affected by a vulnerability:

- A path traversal vulnerability affecting the Windows version of WinRAR allows the attackers to execute arbitrary code by crafting malicious archive files. This vulnerability was exploited in the wild and was discovered by Anton Cherepanov, Peter Košinár, and Peter Strýček from ESET. (CVE-2025-8088)

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.

Solution

Upgrade to RARLAB WinRAR version 7.13 or later.

See Also

http://www.nessus.org/u?7f19c43d

Plugin Details

Severity: High

ID: 248462

File Name: winrar_7_13.nasl

Version: 1.2

Type: local

Agent: windows

Family: Windows

Published: 8/11/2025

Updated: 8/12/2025

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Critical

Score: 9.2

CVSS v2

Risk Factor: High

Base Score: 7.2

Temporal Score: 6

Vector: CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C

CVSS Score Source: CVE-2025-8088

CVSS v3

Risk Factor: High

Base Score: 7.8

Temporal Score: 7.2

Vector: CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:F/RL:O/RC:C

CVSS v4

Risk Factor: High

Base Score: 8.4

Threat Score: 8.4

Threat Vector: CVSS:4.0/E:A

Vector: CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

Vulnerability Information

CPE: cpe:/a:rarlab:winrar

Required KB Items: SMB/Registry/Enumerated, installed_sw/RARLAB WinRAR

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 7/30/2025

Vulnerability Publication Date: 7/30/2025

CISA Known Exploited Vulnerability Due Dates: 9/2/2025

Reference Information

CVE: CVE-2025-8088