CVE-2014-125119
HIGH EXPLOITEDWinRAR - Info Disclosure
Title source: llmDescription
A filename spoofing vulnerability exists in WinRAR when opening specially crafted ZIP archives. The issue arises due to inconsistencies between the Central Directory and Local File Header entries in ZIP files. When viewed in WinRAR, the file name from the Central Directory is displayed to the user, while the file from the Local File Header is extracted and executed. An attacker can leverage this flaw to spoof filenames and trick users into executing malicious payloads under the guise of harmless files, potentially leading to remote code execution.
Exploits (1)
metasploit
WORKING POC
EXCELLENT
by chr1x, juan vazquez · rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/windows/fileformat/winrar_name_spoofing.rb
References (6)
Scores
CVSS v4
8.4
EPSS
0.1613
EPSS Percentile
94.8%
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
Details
VulnCheck KEV
2025-07-25
CWE
CWE-20
CWE-434
Status
published
Products (2)
RARLab/WinRAR
3.80 - 3.91
RARLab/WinRAR
4.11 - 5.00
Published
Jul 25, 2025
Tracked Since
Feb 18, 2026