A newly disclosed vulnerability in WinRAR allows attackers to bypass a core Windows security mechanism, enabling arbitrary code execution on affected systems.
Tracked as CVE-2025-31334, this flaw impacts all WinRAR versions before 7.11 and has been assigned a CVSS score of 6.8, reflecting its potential for high-impact attacks.
The vulnerability targets Windows’ Mark of the Web (MotW) security feature, which flags files downloaded from untrusted sources (e.g., the Internet) and restricts their execution.
Attackers can exploit a weakness in WinRAR’s handling of symbolic link shortcuts that point to other files or folders to bypass these security warnings.
When a user extracts a malicious archive containing a specially crafted symbolic link, WinRAR fails to apply the MotW flag to the linked executable. This allows threat actors to execute malicious code without triggering Windows’ standard security alerts.
WinRAR versions prior to 7.11 have a flaw that RARLAB, the developer, has fixed in the latest update. Users are strongly urged to upgrade immediately.
Taihei Shimamine of Mitsui Bussan Secure Directions discovered the flaw, which was coordinated through JPCERT/CC and the Information Security Early Warning Partnership.
The patch rollout highlights the ongoing challenges archiving tools face in balancing functionality and security, especially as attackers increasingly target widely used software like WinRAR, which boasts over 500 million users globally.
This vulnerability underscores the risks of MotW bypass flaws, which have also affected other tools like 7-Zip (CVE-2025-0411). Such exploits enable “fileless” attacks where malicious payloads evade traditional detection mechanisms.
RARLAB’s prompt response mirrors its handling of past vulnerabilities, including the critical CVE-2023-38831 patched in 2023. However, the recurrence of such issues emphasizes the need for continuous software audits and proactive user updates.
While CVE-2025-31334’s exploitation barriers reduce its immediate risk, organizations and individuals must treat it as a severe threat.
Immediate patching and adherence to cybersecurity best practices remain the most effective defenses against evolving attack vectors targeting archival software.