Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2025-8088 PoC — Path traversal vulnerability in WinRAR

Source
Associated Vulnerability
Title:Path traversal vulnerability in WinRAR (CVE-2025-8088)
Description:A path traversal vulnerability affecting the Windows version of WinRAR allows the attackers to execute arbitrary code by crafting malicious archive files. This vulnerability was exploited in the wild and was discovered by Anton Cherepanov, Peter Košinár, and Peter Strýček from ESET.
Readme
# WinRAR CVE-2025-8088: Exploiting the Vulnerability

This readme provides a proof of concept (PoC) for exploiting CVE-2025-8088 in WinRAR. The vulnerability allows an attacker to change the executable file that gets run when a user interacts with a .ZIP file through WinRAR.

## Overview

The exploit involves modifying a specific registry key to point to a different executable. This can be used to run arbitrary commands or execute malicious code.

## Prerequisites

- Windows operating system
- Administrative privileges
- WinRAR installed

## Exploit Details

The vulnerable registry key is located at:
HKEY_CLASSES_ROOT\WinRAR.ZIP\shell\open\command

By modifying this key, an attacker can change the command that is executed when a .ZIP file is opened with WinRAR.
File Snapshot

[4.0K] /data/pocs/df30105426ffa3d9fb073d44d37eacf250deafa8 └── [ 772] README.md 0 directories, 1 file
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →