CVE-2025-14111

MEDIUM

Rar < 7.11 - Path Traversal

Title source: rule
STIX 2.1

Description

A security vulnerability has been detected in Rarlab RAR App up to 7.11 Build 127 on Android. This affects an unknown part of the component com.rarlab.rar. Such manipulation leads to path traversal. It is possible to launch the attack remotely. Attacks of this nature are highly complex. It is indicated that the exploitability is difficult. The exploit has been disclosed publicly and may be used. Upgrading to version 7.20 build 128 is able to mitigate this issue. You should upgrade the affected component. The vendor responded very professional: "This is the real vulnerability affecting RAR for Android only. WinRAR and Unix RAR versions are not affected. We already fixed it in RAR for Android 7.20 build 128 and we publicly mentioned it in that version changelog. (...) To avoid confusion among users, it would be useful if such disclosure emphasizes that it is RAR for Android only issue and WinRAR isn't affected."

References (4)

Core 4
Core References
Third Party Advisory, VDB Entry vdb-entry
https://vuldb.com/?id.334491
Permissions Required, VDB Entry signature permissions-required
https://vuldb.com/?ctiid.334491
Third Party Advisory, VDB Entry third-party-advisory
https://vuldb.com/?submit.697375

Scores

CVSS v3 5.0
EPSS 0.0021
EPSS Percentile 42.8%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L

CISA SSVC

Vulnrichment
Exploitation poc
Automatable no
Technical Impact partial

Details

CWE
CWE-22
Status published
Products (1)
rarlab/rar < 7.11
Published Dec 05, 2025
Tracked Since Feb 18, 2026