CVE-2025-6218
HIGH KEVRARLAB WinRAR - RCE
Title source: llmDescription
RARLAB WinRAR Directory Traversal Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of RARLAB WinRAR. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of file paths within archive files. A crafted file path can cause the process to traverse to unintended directories. An attacker can leverage this vulnerability to execute code in the context of the current user. Was ZDI-CAN-27198.
Exploits (6)
nomisec
WORKING POC
30 stars
by skimask1690 · client-side
https://github.com/skimask1690/CVE-2025-6218-POC
nomisec
WRITEUP
17 stars
by speinador · client-side
https://github.com/speinador/CVE-2025-6218_WinRAR
nomisec
WORKING POC
14 stars
by absholi7ly · client-side
https://github.com/absholi7ly/CVE-2025-6218-WinRAR-Directory-Traversal-RCE
nomisec
WORKING POC
10 stars
by mulwareX · client-side
https://github.com/mulwareX/CVE-2025-6218-POC
nomisec
WORKING POC
3 stars
by Chrxstxqn · client-side
https://github.com/Chrxstxqn/CVE-2025-6218-WinRAR-RCE-POC
References (5)
Scores
CVSS v3
7.8
EPSS
0.0617
EPSS Percentile
90.9%
Attack Vector
LOCAL
CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Details
CISA KEV
2025-12-09
VulnCheck KEV
2025-08-08
ENISA EUVD
EUVD-2025-28706
CWE
CWE-22
Status
published
Products (1)
rarlab/winrar
< 7.12
Published
Jun 21, 2025
KEV Added
Dec 09, 2025
Tracked Since
Feb 18, 2026