VulnerabilitiesHIGH

7-Zip 24.00 - Critical Directory Traversal Vulnerability

Featured image for 7-Zip 24.00 - Critical Directory Traversal Vulnerability
#CVE-2025-11001#7-Zip#Directory Traversal#Remote Code Execution#Mohammed Idrees Banyamer

Original Reporting

EDExploit-DB

AI Intelligence Briefing

CyberPings AIΒ·Reviewed by Rohit Rana
Severity LevelHIGH

Significant risk β€” action recommended within 24-48 hours

πŸ›‘οΈ
πŸ›‘οΈ VULNERABILITY DETAILSCVE-2025-11001CVSS: 8.8ACTIVELY EXPLOITED
CVE IDCVE-2025-11001
CVSS Score8.8
Severity RatingHigh
Affected Product7-Zip < 25.00
Vendor7-Zip
Vulnerability TypeDirectory Traversal / Remote Code Execution
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredAdministrator
User InteractionRequired
Actively ExploitedYes
Patch AvailableYes
Workaround Availableβ€”
🎯

Basically, a flaw in 7-Zip lets attackers run harmful code on your computer.

Quick Summary

A critical flaw in 7-Zip 24.00 allows attackers to execute harmful code remotely. Users must upgrade to version 25.00 to avoid exploitation. Don't risk your system's security!

The Flaw

A serious directory traversal vulnerability has been discovered in 7-Zip version 24.00, identified as CVE-2025-11001. This flaw allows attackers to exploit the software by crafting malicious ZIP files that, when extracted, can lead to remote code execution (RCE) on the victim's system. The vulnerability arises from the mishandling of symlink entries in ZIP archives.

What's at Risk

If a user extracts a malicious ZIP file using 7-Zip as an Administrator, the attacker can gain full control over the system. This poses a significant risk, especially for users who might unknowingly extract files from untrusted sources.

Patch Status

A patch has been released in version 25.00 of 7-Zip, addressing this vulnerability. Users are strongly advised to upgrade to this version or later to protect against potential exploitation. The vulnerability has a CVSS score of 8.8, indicating a high severity level.

Immediate Actions

To mitigate the risks associated with this vulnerability, users should:

  • Upgrade to 7-Zip 25.00 or later immediately.
  • Avoid extracting ZIP files from unknown or untrusted sources.
  • Run security software to detect and prevent malicious ZIP files from being executed.

Technical Details

The exploit allows attackers to create a ZIP file that includes a symlink entry pointing to sensitive system directories. When the victim extracts this ZIP file with an affected version of 7-Zip, the malicious payload can be executed without the user's consent, leading to a complete system compromise.

Conclusion

This vulnerability highlights the importance of keeping software up to date and being cautious with file extraction from untrusted sources. Users should take immediate action to secure their systems against this critical threat.

πŸ” How to Check If You're Affected

  1. 1.Check the installed version of 7-Zip; ensure it is 25.00 or later.
  2. 2.Review system logs for any unauthorized extraction of ZIP files.
  3. 3.Run antivirus scans to detect any malicious files that may have been extracted.

🏒 Impacted Sectors

All Sectors

Pro Insight

πŸ”’ Pro insight: The availability of a public exploit means rapid adoption by threat actors; immediate patching is essential.

Sources

Original Report

EDExploit-DB
Read Original

Related Pings

HIGHVulnerabilities

Outdated Software - Major Security Risks for Macs & Mobile

Research shows outdated software on Macs and mobile devices poses significant security risks. Over half of organizations are affected, risking sensitive data. Keeping systems updated is vital for security.

SC MediaΒ·
HIGHVulnerabilities

XiboCMS 3.3.4 - Critical Remote Code Execution Flaw

A critical flaw in XiboCMS 3.3.4 allows attackers to execute arbitrary code. This vulnerability puts user data at risk and requires immediate action to mitigate. Upgrade your systems now to stay safe.

Exploit-DBΒ·
CRITICALVulnerabilities

IBM Identity and Verify Access Vulnerabilities Exposed

IBM has disclosed critical vulnerabilities in its Verify Identity Access products. If unpatched, these flaws could allow attackers to access sensitive data. Organizations must act fast to secure their systems.

Cyber Security NewsΒ·
CRITICALVulnerabilities

Adobe Reader - Hackers Target Users with 0-Day Exploit

A new zero-day exploit is targeting Adobe Reader users, stealing sensitive data without any user action. Security experts warn of the risks and urge immediate precautions. Stay vigilant and avoid opening suspicious PDFs.

Cyber Security NewsΒ·
HIGHVulnerabilities

Horilla v1.3 - Critical RCE Vulnerability Exploited

A critical RCE vulnerability in Horilla v1.3 has been exploited, allowing unauthorized access. Organizations must secure their systems to prevent exploitation. Immediate action is required to mitigate risks.

Exploit-DBΒ·
HIGHVulnerabilities

Microsoft MMC MSC EvilTwin - Local Admin Creation Exploit

A new vulnerability in Microsoft MMC allows attackers to create local admin accounts through malicious files. This affects Windows 10 and 11 users. Immediate patching is crucial to prevent unauthorized access.

Exploit-DBΒ·