Skip to content
appaloosa scout logo main rounded
HIGH 7.8 KEV

CVE-2025-6218

RARLAB WinRAR Directory Traversal Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of RARLAB WinRAR. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.

The specific flaw exists within the handling of file paths within archive files. A crafted file path can cause the process to traverse to unintended directories. An attacker can leverage this vulnerability to execute code in the context of the current user. Was ZDI-CAN-27198.

CVSS v3 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
EPSS 5.7% percentile 90.5%

CISA Known Exploited Vulnerability

Added to KEV
2025-12-09
Remediation deadline
2025-12-30
Required action
Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
Ransomware
No

Affected tracked apps

Vulnerable CPE configurations

Vendor Product Platform Versions CPE 2.3 URI
rarlab winrar Windows <7.12 cpe:2.3:a:rarlab:winrar:*:*:*:*:*:*:*:*
View on NVD ↗ CISA KEV catalog ↗