WinRAR path traversal flaw still exploited by numerous hackers

Parkinsond

Level 62
Thread author
Verified
Well-known
Dec 6, 2023
5,052
14,232
6,069
The security issue is a path traversal flaw that leverages Alternate Data Streams (ADS) to write malicious files to arbitrary locations.
Attackers have exploited this in the past to plant malware in the Windows Startup folder, for persistence across reboots.

Researchers at cybersecurity company ESET discovered the vulnerability and reported in early August 2025 that the Russia-aligned group RomCom had been exploiting it in zero-day attacks.

"While the user typically views a decoy document, such as a PDF, within the archive, there are also malicious ADS entries, some containing a hidden payload while others are dummy data," Google researchers explain.

When opened, WinRAR extracts the ADS payload using directory traversal, often dropping LNK, HTA, BAT, CMD, or script files that execute on user login.

 
Observed Threat Actors

UNC4895 (RomCom)

Delivering "NESTPACKER" (Snipbot) via spear-phishing.

APT44 (FROZENBARENTS)
Using malicious LNK files and decoys.

Turla (SUMMIT)
Delivering the "STOCKSTAY" malware suite.

TEMP.Armageddon
Dropping HTA downloaders into Startup folders (active into 2026).

MITRE ATT&CK Mapping

T1553.005

Subvert Trust Controls: Alternate Data Streams.

T1037.005
Boot or Logon Initialization Scripts: Startup Items.

T1204.002
User Execution: Malicious File.


Remediation - THE ENTERPRISE TRACK

Blast Radius & Containment

Immediately audit all endpoints for WinRAR versions below 7.13 and force-update or uninstall.

Restrict the execution of scripts (.hta, .bat, .cmd) from user-writable directories using AppLocker or Windows Defender Application Control (WDAC).

TTP & Forensic Indicators

Persistence

Scan %APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup for unauthorized .lnk or script files.

ADS Detection
Utilize tools like Streams.exe (Sysinternals) to detect hidden data streams in downloaded archives.

Malware Hashes
Monitor for commodity RATs like XWorm and AsyncRAT often delivered via this vector.

Detection Engineering

SIEM/KQL Logic

Monitor for ProcessCreation events where WinRAR.exe is the parent process and the child process involves cmd[.]exe or powershell[.]exe writing to the Startup folder.

D3FEND Mapping
Implement File Content Analysis (D3-FCA) to inspect archive headers for path traversal sequences.

Governance

Trigger CIRCIA/CISA reporting if the exploitation leads to a confirmed breach of critical infrastructure or PII.


Remediation - THE HOME USER TRACK

Safety

Immediately update WinRAR to the latest version (7.13+) or switch to an alternative like 7-Zip.

Disconnect any suspected infected device from the internet and run a full scan with a reputable offline antivirus tool.

Identity
Reset passwords and MFA for sensitive accounts (banking, email, work) using a known clean device.

Check browser extensions for unauthorized additions, as threat actors have deployed malicious Chrome banking extensions via this flaw.

Persistence
Manually check your Startup folder: Press Win+R, type shell[:]startup, and delete any files you do not recognize.


Hardening & References

CIS/NIST Baseline

Follow NIST SP 800-40 Rev. 4 (Guide to Enterprise Patch Management) to ensure critical vulnerabilities like CVE-2025-8088 are prioritized within 24-48 hours.

References

BleepingComputer: WinRAR path traversal flaw exploited by numerous hackers

Google Threat Intelligence: Exploiting Critical WinRAR Vulnerability

NIST NVD
(CVE-2025-8088)
 
  • Like
Reactions: harlan4096
Yes. It skips "../ " entries in paths. So, directory traversal cannot work, and the attack fails.
Didn't realise Windows built in handled RAR files (and 7z and TAR) - saying that, I can't remember the last time i used one.

May as well ditch WinRAR now!
 
  • Like
Reactions: Parkinsond
Didn't realise Windows built in handled RAR files (and 7z and TAR) - saying that, I can't remember the last time i used one.

May as well ditch WinRAR now!
W built-in extractor is good; only lacks the ability to extract password-protected archives (most of them used to deliver malware under radar).
 
  • Like
Reactions: superleeds27