Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2025-8088— Path traversal vulnerability in WinRAR

KEV EPSS 8.29% · P92
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2025-8088

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Path traversal vulnerability in WinRAR
Source: NVD (National Vulnerability Database)
Vulnerability Description
A path traversal vulnerability affecting the Windows version of WinRAR allows the attackers to execute arbitrary code by crafting malicious archive files. This vulnerability was exploited in the wild and was discovered by Anton Cherepanov, Peter Košinár, and Peter Strýček from ESET.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
路径遍历:’…/…//’
Source: NVD (National Vulnerability Database)
Vulnerability Title
WinRAR 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
WinRAR是WinRAR公司的一款文件压缩器。该产品支持RAR、ZIP等格式文件的压缩和解压等。 WinRAR存在安全漏洞,该漏洞源于路径遍历问题,可能导致任意代码执行。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Shenlong Deep Dive — AI Deep Analysis

10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.

Affected Products

VendorProductAffected VersionsCPESubscribe
win.rar GmbHWinRAR 0 ~ 7.12 -

II. Public POCs for CVE-2025-8088

#POC DescriptionSource LinkShenlong Link
1Python tool for safe archive handling, path traversal awareness, and secure extraction. Inspired by CVE-2025-8088.https://github.com/jordan922/CVE-2025-8088POC Details
2cve-2025-8088_detectionhttps://github.com/travisbgreen/cve-2025-8088POC Details
3WinRAR 0day CVE-2025-8088 PoC RAR Archivehttps://github.com/knight0x07/WinRAR-CVE-2025-8088-PoC-RARPOC Details
4CVE-2025-8088 WinRAR Proof of Concept (PoC-Exploit)https://github.com/sxyrxyy/CVE-2025-8088-WinRAR-Proof-of-Concept-PoC-Exploit-POC Details
5Advanced WinRAR Path Traversal Exploit Tool for CVE-2025-8088https://github.com/onlytoxi/CVE-2025-8088-Winrar-ToolPOC Details
6Nonehttps://github.com/0xAbolfazl/CVE-2025-8088-WinRAR-PathTraversal-PoCPOC Details
7Exploit systems using older WinRARhttps://github.com/pentestfunctions/CVE-2025-8088-Multi-DocumentPOC Details
8Proof-of-Concept for CVE-2025-8088 vulnerability in WinRAR (path traversal via ADS)https://github.com/pexlexity/WinRAR-CVE-2025-8088-Path-Traversal-PoCPOC Details
9Nonehttps://github.com/Syrins/CVE-2025-8088-Winrar-Tool-GuiPOC Details
10🚀 Demonstrate the WinRAR CVE-2025-8088 exploit with a PoC RAR archive that installs a VBScript on startup, showcasing its impact on vulnerable systems.https://github.com/amel-62/WinRAR-CVE-2025-8088-PoC-RARPOC Details
11This PoC is for authorized study and testing. CVE-2025-8088 is actively exploited, and misuse may violate laws or cause harm. Update to WinRAR 7.13+ to avoid suspicious RARs.https://github.com/ghostn4444/CVE-2025-8088POC Details
12Nonehttps://github.com/DeepBlue-dot/CVE-2025-8088-WinRAR-Startup-PoCPOC Details
13POWERSHEL script to check if your device is affected or nohttps://github.com/pescada-dev/-CVE-2025-8088POC Details
14An engaging walkthrough on uncovering, patching, and securing the WinRAR CVE-2025-8088 with a hands-on hacker’s twist.https://github.com/AdityaBhatt3010/CVE-2025-8088-WinRAR-Zero-Day-Path-TraversalPOC Details
15Winrar CVE exploitation before 7.13 using multiple ADS streams on a single file (Custom PDF implementation)https://github.com/pentestfunctions/best-CVE-2025-8088POC Details
16Nonehttps://github.com/nyra-workspace/CVE-2025-8088POC Details
17A high-performance, memory-safe implementation of the WinRAR CVE-2025-8088 exploit tool, rewritten in Rust for better reliability and performance.https://github.com/kitsuneshade/WinRAR-Exploit-Tool---Rust-EditionPOC Details
18Nonehttps://github.com/walidpyh/CVE-2025-8088POC Details
19Nonehttps://github.com/hexsecteam/CVE-2025-8088-Winrar-ToolPOC Details
20WinRAR CVE-2025-8088 exploit toolhttps://github.com/cozythrill/CVE-2025-8088POC Details
21CVE-2025-8088 path traversal toolhttps://github.com/tartalu/CVE-2025-8088POC Details
22A proof-of-concept exploit for WinRAR vulnerability (CVE-2025-8088) affecting versions 7.12 and lower. This tool creates a malicious RAR archive that embeds payloads in Alternate Data Streams (ADS) with path traversal, potentially leading to arbitrary code execution.https://github.com/techcorp/CVE-2025-8088-ExploitPOC Details
23CVE-2025-8088https://github.com/nhattanhh/CVE-2025-8088POC Details
24Nonehttps://github.com/Shinkirou789/Cve-2025-8088-WinRar-vulnerabilityPOC Details
25WinRAR漏洞CVE-2025-8088的payload一键生成工具https://github.com/hbesljx/CVE-2025-8088-EXPPOC Details
26CVE-2025-8088 path traversal toolhttps://github.com/Osinskitito499/CVE-2025-8088POC Details
27CVE-2025-8088 path traversal toolhttps://github.com/m4nbun/CVE-2025-8088POC Details
28🚨 Exploit WinRAR CVE-2025-8088 with this PoC RAR archive, demonstrating the vulnerability and its impact when executed on the affected software.https://github.com/pablo388/WinRAR-CVE-2025-8088-PoC-RARPOC Details
29CVE-2025-8088 exploit C++ implhttps://github.com/lucyna77/winrar-exploitPOC Details
30CVE-2025-8088 based path traversal toolhttps://github.com/kyomber/CVE-2025-8088POC Details
31Nonehttps://github.com/Fathi-MO/POC-CVE-2025-8088POC Details
32CVE-2025-8088 based path traversal toolhttps://github.com/haspread/CVE-2025-8088POC Details
33CVE-2025-8088 based path traversal toolhttps://github.com/tookATE/CVE-2025-8088POC Details
34WinRAR 0day CVE-2025-8088 PoC RAR Archivehttps://github.com/Snorx-cyber/CVE-2025-8088-builderPOC Details
35CVE-2025-8088-BUILDERhttps://github.com/aldisakti2/CVE-2025-8088-BUILDER-Winrar-ToolPOC Details
36path traversal tool based on cve-2025-8088 https://github.com/blowrrr/cve-2025-8088POC Details
37A POC exploit for WinRAR vulnerability (CVE-2025-8088) affecting versions 7.12 and lowerhttps://github.com/papcaii2004/CVE-2025-8088-WinRAR-builderPOC Details
38Path traversal tool based on cve-2025-8088 vulnerabilityhttps://github.com/kaucent/CVE-2025-8088POC Details
39path traversal tool based on cve 2025 8088 vurnelabilityhttps://github.com/mocred/cve-2025-8088POC Details
40CVE-2025-8088https://github.com/B1ack4sh/Blackash-CVE-2025-8088POC Details
41Nonehttps://github.com/nuky-alt/CVE-2025-8088POC Details
42Path traversal tool based on cve 2025 8088https://github.com/h4vier/cve-2025-8088POC Details
43Path traversal tool based on cve-2025-8088https://github.com/4daysday/cve-2025-8088POC Details
44CVE-2025-8088https://github.com/Ashwesker/Blackash-CVE-2025-8088POC Details
45Nonehttps://github.com/xi0onamdev/WinRAR-CVE-2025-8088-Exploitation-ToolkitPOC Details
46🛠 Exploit CVE-2025-8088 with this Python tool to generate malicious WinRAR archives that ensure payload persistence in Windows startup folders.https://github.com/Markusino488/cve-2025-8088POC Details
47CVE 2025 8088https://github.com/vitalichkaa/CVE-2025-8088POC Details
48Defensive PowerShell tool for static inspection of RAR archives and detection of CVE-2025-8088 path traversal anomalies.https://github.com/ilhamrzr/RAR-Anomaly-InspectorPOC Details
49Nonehttps://github.com/Ismael-20223/CVE-2025-8088POC Details
50Herramienta avanzada de explotación transversal de ruta de WinRAR para CVE-2025-8088https://github.com/undefined-name12/CVE-2025-8088-WinrarPOC Details
51Nonehttps://github.com/IsmaelCosma/CVE-2025-8088POC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2025-8088

登录查看更多情报信息。

IV. Related Vulnerabilities

V. Comments for CVE-2025-8088

No comments yet


Leave a comment