CVE-2023-38831

HIGH KEV RANSOMWARE

WinRAR CVE-2023-38831 Exploit

Title source: metasploit

Description

RARLAB WinRAR before 6.23 allows attackers to execute arbitrary code when a user attempts to view a benign file within a ZIP archive. The issue occurs because a ZIP archive may include a benign file (such as an ordinary .JPG file) and also a folder that has the same name as the benign file, and the contents of the folder (which may include executable content) are processed during an attempt to access only the benign file. This was exploited in the wild in April through October 2023.

Exploits (61)

nomisec WORKING POC 788 stars
by b1tg · client-side
https://github.com/b1tg/CVE-2023-38831-winrar-exploit
nomisec WORKING POC 129 stars
by Garck3h · client-side
https://github.com/Garck3h/cve-2023-38831
nomisec WORKING POC 115 stars
by ignis-sec · client-side
https://github.com/ignis-sec/CVE-2023-38831-RaRCE
nomisec WORKING POC 94 stars
by BoredHackerBlog · client-side
https://github.com/BoredHackerBlog/winrar_CVE-2023-38831_lazy_poc
nomisec WORKING POC 89 stars
by HDCE-inc · client-side
https://github.com/HDCE-inc/CVE-2023-38831
nomisec WRITEUP 40 stars
by knight0x07 · poc
https://github.com/knight0x07/WinRAR-Code-Execution-Vulnerability-CVE-2023-38831
nomisec WORKING POC 22 stars
by Maalfer · client-side
https://github.com/Maalfer/CVE-2023-38831_ReverseShell_Winrar-RCE
nomisec WORKING POC 15 stars
by xaitax · client-side
https://github.com/xaitax/WinRAR-CVE-2023-38831
nomisec WORKING POC 13 stars
by MorDavid · client-side
https://github.com/MorDavid/CVE-2023-38831-Winrar-Exploit-Generator-POC
nomisec WORKING POC 11 stars
by ahmed-fa7im · poc
https://github.com/ahmed-fa7im/CVE-2023-38831-winrar-expoit-simple-Poc
nomisec WORKING POC 10 stars
by youmulijiang · client-side
https://github.com/youmulijiang/evil-winrar
nomisec WORKING POC 9 stars
by Malwareman007 · client-side
https://github.com/Malwareman007/CVE-2023-38831
nomisec WORKING POC 6 stars
by z3r0sw0rd · client-side
https://github.com/z3r0sw0rd/CVE-2023-38831-PoC
nomisec WORKING POC 4 stars
by xk-mt · client-side
https://github.com/xk-mt/WinRAR-Vulnerability-recurrence-tutorial
nomisec WORKING POC 4 stars
by UnHackerEnCapital · client-side
https://github.com/UnHackerEnCapital/PDFernetRemotelo
nomisec WRITEUP 4 stars
by PascalAsch · poc
https://github.com/PascalAsch/CVE-2023-38831-KQL
nomisec WORKING POC 3 stars
by ameerpornillos · client-side
https://github.com/ameerpornillos/CVE-2023-38831-WinRAR-Exploit
nomisec WORKING POC 3 stars
by Mich-ele · client-side
https://github.com/Mich-ele/CVE-2023-38831-winrar
nomisec WORKING POC 3 stars
by akhomlyuk · client-side
https://github.com/akhomlyuk/cve-2023-38831
nomisec WORKING POC 3 stars
by malvika-thakur · dos
https://github.com/malvika-thakur/CVE-2023-38831
nomisec WORKING POC 2 stars
by kuyrathdaro · local
https://github.com/kuyrathdaro/cve-2023-38831
nomisec WORKING POC 2 stars
by r1yaz · client-side
https://github.com/r1yaz/winDED
nomisec WORKING POC 2 stars
by MaorBuskila · poc
https://github.com/MaorBuskila/Windows-X64-RAT
nomisec WORKING POC 2 stars
by RonF98 · client-side
https://github.com/RonF98/CVE-2023-38831-POC
nomisec SCANNER 2 stars
by IR-HuntGuardians · poc
https://github.com/IR-HuntGuardians/CVE-2023-38831-HUNT
nomisec WORKING POC 1 stars
by ruycr4ft · client-side
https://github.com/ruycr4ft/CVE-2023-38831
nomisec WORKING POC 1 stars
by technicalcorp0 · client-side
https://github.com/technicalcorp0/CVE-2023-38831-Exploit
nomisec WORKING POC 1 stars
by Ben1B3astt · poc
https://github.com/Ben1B3astt/CVE-2023-38831_ReverseShell_Winrar
nomisec WORKING POC 1 stars
by s4m98 · client-side
https://github.com/s4m98/winrar-cve-2023-38831-poc-gen
nomisec WORKING POC 1 stars
by SpamixOfficial · client-side
https://github.com/SpamixOfficial/CVE-2023-38831
nomisec SCANNER 1 stars
by yezzfusl · poc
https://github.com/yezzfusl/cve_2023_38831_scanner
nomisec WORKING POC
by VictoriousKnight · client-side
https://github.com/VictoriousKnight/CVE-2023-38831_Exploit
nomisec WORKING POC
by ngothienan · poc
https://github.com/ngothienan/CVE-2023-38831
nomisec WORKING POC
by idkwastaken · client-side
https://github.com/idkwastaken/CVE-2023-38831
nomisec SUSPICIOUS
by Nielk74 · poc
https://github.com/Nielk74/CVE-2023-38831
nomisec WORKING POC
by kehrijksen · client-side
https://github.com/kehrijksen/CVE-2023-38831
nomisec WORKING POC
by Fa1c0n35 · client-side
https://github.com/Fa1c0n35/CVE-2023-38831-winrar-exploit
github SUSPICIOUS
by DanukaNuwan · poc
https://github.com/DanukaNuwan/CVE-Exploits/tree/main/CVE-2023-38831.pdf
nomisec NO CODE
by Hirusha-N · poc
https://github.com/Hirusha-N/CVE-2021-34527-CVE-2023-38831-and-CVE-2023-32784
nomisec WRITEUP
by h3xecute · poc
https://github.com/h3xecute/SideCopy-Exploits-CVE-2023-38831
nomisec WORKING POC
by an040702 · client-side
https://github.com/an040702/CVE-2023-38831
nomisec WRITEUP
by ra3edAJ · poc
https://github.com/ra3edAJ/LAB-DFIR-cve-2023-38831
nomisec WORKING POC
by khanhtranngoccva · poc
https://github.com/khanhtranngoccva/cve-2023-38831-poc
nomisec WORKING POC
by ML-K-eng · poc
https://github.com/ML-K-eng/CVE-2023-38831-Exploit-and-Detection
nomisec WRITEUP
by Tolu12wani · poc
https://github.com/Tolu12wani/Demonstration-of-CVE-2023-38831-via-Reverse-Shell-Execution
nomisec WORKING POC
by thegr1ffyn · client-side
https://github.com/thegr1ffyn/CVE-2023-38831
nomisec WORKING POC
by sudo-py-dev · poc
https://github.com/sudo-py-dev/CVE-2023-38831
nomisec WORKING POC
by ouoxii · poc
https://github.com/ouoxii/Software-Testing-Final-Project
nomisec WRITEUP
by mishra0230 · poc
https://github.com/mishra0230/CVE-2023-38831
nomisec WORKING POC
by anelya0333 · poc
https://github.com/anelya0333/Exploiting-CVE-2023-38831
nomisec WORKING POC
by GOTonyGO · client-side
https://github.com/GOTonyGO/CVE-2023-38831-winrar
nomisec SUSPICIOUS
by MyStuffYT · client-side
https://github.com/MyStuffYT/CVE-2023-38831-POC
nomisec WORKING POC
by sh770 · poc
https://github.com/sh770/CVE-2023-38831
nomisec WORKING POC
by RomainBayle08 · client-side
https://github.com/RomainBayle08/CVE-2023-38831
nomisec WORKING POC
by imbyter · client-side
https://github.com/imbyter/imbyter-WinRAR_CVE-2023-38831
nomisec WORKING POC
by solomon12354 · poc
https://github.com/solomon12354/VolleyballSquid-----CVE-2023-38831-and-Bypass-UAC
nomisec WRITEUP
by FirFirdaus · client-side
https://github.com/FirFirdaus/CVE-2023-38831
nomisec WORKING POC
by asepsaepdin · client-side
https://github.com/asepsaepdin/CVE-2023-38831
metasploit WORKING POC EXCELLENT
by Alexander, Hagenah · rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/windows/fileformat/winrar_cve_2023_38831.rb

Scores

CVSS v3 7.8
EPSS 0.9376
EPSS Percentile 99.8%
Attack Vector LOCAL
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Exploitation Intel

CISA KEV 2023-08-24
VulnCheck KEV 2023-07-10
InTheWild.io 2023-07-10
ENISA EUVD EUVD-2023-42604
Ransomware Use Confirmed

Classification

CWE
CWE-345 CWE-351
Status published

Affected Products (1)

rarlab/winrar < 6.23

Timeline

Published Aug 23, 2023
KEV Added Aug 24, 2023
Tracked Since Feb 18, 2026