Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2025-8088 PoC — Path traversal vulnerability in WinRAR

Source
Associated Vulnerability
Title:Path traversal vulnerability in WinRAR (CVE-2025-8088)
Description:A path traversal vulnerability affecting the Windows version of WinRAR allows the attackers to execute arbitrary code by crafting malicious archive files. This vulnerability was exploited in the wild and was discovered by Anton Cherepanov, Peter Košinár, and Peter Strýček from ESET.
Description
CVE-2025-8088 based path traversal tool
Readme
# CVE-2025-8088 WinRAR path traversal tool

> **⚠ This tool is created solely for educational use only. Unauthorized use outside of controlled environments is strictly prohibited.**

A Python script that exploits CVE-2025-8088, a path traversal vulnerability in WinRAR, by generating a malicious archive that places executable payloads into the Windows startup folder using multiple relative directory levels to ensure reliable execution regardless of the extraction location

# Requirements
- Windows OS 
- Python 3.4+
- Pip
- WinRar

# Features
- **Fully customizable decoy files**
- **Deploys payload to Windows startup for persistence**
- **Hides payload using ADS**
- **Patches RAR headers structure for path injection**
- **Ensures archive integrity by regenerating CRC values**

# How it works? 
1. Creates decoy files
2. Embeds payload streams using multiple levels of path traversal using ADS
3. Modifies archives structure with ADS
4. CRC recalculation
5. Delivers output to Startup

# Configuration⚙
Configure the config.py file
```python
# Configuration
DECOY_FILE_NAME = "document"
DROP_PATH = "AppData\\Roaming\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\payload.bat"
PAYLOAD = "@echo off\nstart /B C:\Users\Public\file.exe\n"
```
To use your own decoy file, type its full path instead of name.

# Run💨
Run the script:
```shell
python CVE-2025-8088.py
```
The output will appear in the output folder.

# Disclaimer
This tool is created solely for educational use only. Unauthorized use outside of controlled environments is strictly prohibited.




File Snapshot

[4.0K] /data/pocs/662fd02deadcf705d987ed2f9b87148ae4aadb51 ├── [ 209] config.py ├── [2.5K] CVE-2025-8088.py ├── [4.1K] extract.py └── [1.5K] README.md 0 directories, 4 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →