nomisec
WORKING POC
67 stars
by sxyrxyy · client-side
https://github.com/sxyrxyy/CVE-2025-8088-WinRAR-Proof-of-Concept-PoC-Exploit-
This repository contains a functional Python-based PoC exploit for CVE-2025-8088, a path traversal vulnerability in WinRAR ≤ 7.12. The exploit leverages alternate data streams (ADSes) and crafted RAR archives to place malicious files outside the intended extraction directory, potentially leading to arbitrary code execution.
Classification
Working Poc 95%
Target:
WinRAR ≤ 7.12
No auth needed
Prerequisites:
Python · rar.exe (WinRAR command-line tool) · decoy file · payload file
nomisec
WORKING POC
53 stars
by onlytoxi · client-side
https://github.com/onlytoxi/CVE-2025-8088-Winrar-Tool
This repository contains a functional exploit tool for CVE-2025-8088, a WinRAR path traversal vulnerability. It leverages NTFS Alternate Data Streams (ADS) and RAR5 header manipulation to create malicious archives that can place payloads in arbitrary locations, such as the Windows startup folder.
Classification
Working Poc 95%
Target:
WinRAR (version not specified, but likely recent versions supporting RAR5 format)
No auth needed
Prerequisites:
WinRAR installed on the target system · NTFS filesystem (for ADS) · Python 3.6+ and customtkinter for the tool
nomisec
WORKING POC
45 stars
by knight0x07 · poc
https://github.com/knight0x07/WinRAR-CVE-2025-8088-PoC-RAR
This repository contains a functional PoC for CVE-2025-8088, a WinRAR vulnerability that drops a VBScript file in the Startup directory upon extraction, demonstrating arbitrary file write capabilities. The exploit triggers a message box upon system reboot, confirming successful exploitation.
Classification
Working Poc 80%
Target:
WinRAR (version not specified)
No auth needed
Prerequisites:
Vulnerable WinRAR installation · User interaction to extract the RAR file
nomisec
WORKING POC
34 stars
by pentestfunctions · client-side
https://github.com/pentestfunctions/CVE-2025-8088-Multi-Document
This repository contains a functional Python exploit for CVE-2025-8088, a path traversal vulnerability in WinRAR. The exploit creates a malicious RAR archive that deploys a payload to the Windows startup folder using multiple relative path traversal depths.
Classification
Working Poc 95%
Target:
WinRAR (version not specified)
No auth needed
Prerequisites:
WinRAR installed on target system · Victim must extract the malicious RAR archive
nomisec
WORKING POC
22 stars
by hexsecteam · client-side
https://github.com/hexsecteam/CVE-2025-8088-Winrar-Tool
This repository contains a functional GUI tool for exploiting CVE-2025-8088, a WinRAR path traversal vulnerability. It leverages NTFS Alternate Data Streams (ADS) and RAR5 header manipulation to create malicious archives that can place payloads in Windows startup directories.
Classification
Working Poc 95%
Target:
WinRAR (version not specified)
No auth needed
Prerequisites:
Python 3.6+ · WinRAR CLI · customtkinter · NTFS filesystem
nomisec
WORKING POC
10 stars
by jordan922 · client-side
https://github.com/jordan922/CVE-2025-8088
This repository contains a functional PoC for CVE-2025-8088, a path traversal vulnerability in WinRAR. The script creates a malicious RAR archive that exploits the vulnerability to place files in arbitrary locations, such as the Startup folder. It also includes a safe extraction tool to audit and mitigate such vulnerabilities.
Classification
Working Poc 95%
Target:
WinRAR < 7.13
No auth needed
Prerequisites:
WinRAR installed on the target system · Ability to deliver the malicious RAR archive to the victim
nomisec
WRITEUP
8 stars
by AdityaBhatt3010 · poc
https://github.com/AdityaBhatt3010/CVE-2025-8088-WinRAR-Zero-Day-Path-Traversal
This repository provides a detailed technical analysis of CVE-2025-8088, a path traversal vulnerability in WinRAR. It includes a proof-of-concept (PoC) for generating a malicious RAR file that exploits the vulnerability to place arbitrary files in sensitive directories, along with mitigation and detection guidance.
Classification
Writeup 95%
Target:
WinRAR (≤7.12)
No auth needed
Prerequisites:
Vulnerable version of WinRAR (≤7.12) · Ability to deliver a malicious RAR file to the target
nomisec
WORKING POC
7 stars
by lucyna77 · poc
https://github.com/lucyna77/winrar-exploit
This repository contains a functional exploit for CVE-2025-8088, leveraging Alternate Data Streams (ADS) and path traversal in WinRAR archives to achieve arbitrary file placement in the victim's Startup folder, leading to code execution upon system reboot.
Classification
Working Poc 95%
Target:
WinRAR (versions prior to the patch for CVE-2025-8088)
No auth needed
Prerequisites:
Knowledge of the victim's Windows username · Victim must extract the malicious archive · Victim must reboot the system for payload execution
nomisec
WORKING POC
7 stars
by pentestfunctions · client-side
https://github.com/pentestfunctions/best-CVE-2025-8088
The repository contains a functional exploit for CVE-2025-8088, which leverages path traversal in RAR file processing to achieve arbitrary file write. The PoC generates a malicious RAR archive with crafted stream names and path traversal sequences to drop a payload in the Windows Startup folder.
Classification
Working Poc 90%
Target:
WinRAR (version not specified)
No auth needed
Prerequisites:
Victim interaction to open the malicious RAR file
nomisec
WORKING POC
7 stars
by kitsuneshade · client-side
https://github.com/kitsuneshade/WinRAR-Exploit-Tool---Rust-Edition
This repository contains a functional Rust-based exploit tool for CVE-2025-8088, targeting WinRAR's path traversal vulnerability. It leverages NTFS Alternate Data Streams (ADS) and RAR5 header manipulation to achieve arbitrary file write during archive extraction.
Classification
Working Poc 95%
Target:
WinRAR (versions affected by CVE-2025-8088)
No auth needed
Prerequisites:
NTFS file system · WinRAR CLI installed · Windows 10/11 · Rust toolchain
nomisec
WORKING POC
3 stars
by walidpyh · client-side
https://github.com/walidpyh/CVE-2025-8088
This repository contains a functional proof-of-concept exploit for CVE-2025-8088, demonstrating how an Alternate Data Stream (ADS) payload can be embedded into a WinRAR RAR5 archive. The exploit leverages ADS to hide a payload within a decoy file, which is then extracted to a target directory (e.g., Startup folder) when the archive is processed.
Classification
Working Poc 95%
Target:
WinRAR (RAR5 format)
No auth needed
Prerequisites:
Windows environment · WinRAR installed · Python 3.10+
nomisec
SUSPICIOUS
3 stars
by Syrins · poc
https://github.com/Syrins/CVE-2025-8088-Winrar-Tool-Gui
The repository claims to demonstrate a path traversal vulnerability in WinRAR but lacks actual exploit code, focusing instead on a GUI tool with vague features like 'AES encryption' and 'payload obfuscation'. The README is overly polished with marketing language and no technical details about CVE-2025-8088.
Classification
Suspicious 90%
Target:
WinRAR
No auth needed
Prerequisites:
WinRAR installed · Python 3.8+
nomisec
WORKING POC
2 stars
by pexlexity · poc
https://github.com/pexlexity/WinRAR-CVE-2025-8088-Path-Traversal-PoC
This repository contains a functional PoC for CVE-2025-8088, a path traversal vulnerability in WinRAR ≤7.12. The exploit leverages NTFS Alternate Data Streams (ADS) to place files outside the intended extraction directory, achieving persistence by dropping payloads into the Startup folder.
Classification
Working Poc 95%
Target:
WinRAR ≤7.12
No auth needed
Prerequisites:
WinRAR installed with rar.exe in PATH · NTFS filesystem for ADS support · Payload file (e.g., BAT or EXE)
nomisec
WRITEUP
2 stars
by travisbgreen · poc
https://github.com/travisbgreen/cve-2025-8088
This repository provides a technical overview and detection strategies for CVE-2025-8088, a path traversal vulnerability in WinRAR. It includes references to research and detection signatures but does not contain exploit code.
Classification
Writeup 90%
Target:
WinRAR
No auth needed
Prerequisites:
Access to a vulnerable version of WinRAR
nomisec
WORKING POC
1 stars
by bigblue-34 · poc
https://github.com/bigblue-34/CVE-2025-8088-WinRAR-Startup-PoC
This repository contains a functional Python-based PoC for CVE-2025-8088, exploiting a WinRAR path traversal vulnerability via Alternate Data Streams (ADS) to achieve arbitrary file write to the Windows Startup folder. The exploit creates a malicious RAR archive that, when extracted, writes a payload to the Startup folder for persistence.
Classification
Working Poc 95%
Target:
WinRAR versions prior to 7.00 (build 10)
No auth needed
Prerequisites:
Windows OS with NTFS file system · Python 3.7+ · WinRAR installed (rar.exe in PATH or specified)
nomisec
WORKING POC
1 stars
by 0xAbolfazl · local
https://github.com/0xAbolfazl/CVE-2025-8088-WinRAR-PathTraversal-PoC
This repository contains a functional exploit for CVE-2025-8088, a path traversal vulnerability in WinRAR ≤ 7.12. The exploit leverages Alternate Data Streams (ADS) and crafted RAR archives to achieve arbitrary file write, potentially leading to remote code execution.
Classification
Working Poc 95%
Target:
WinRAR ≤ 7.12
No auth needed
Prerequisites:
WinRAR ≤ 7.12 installed · NTFS file system for ADS support · Ability to deliver malicious RAR archive to target
nomisec
SCANNER
1 stars
by ilhamrzr · poc
https://github.com/ilhamrzr/RAR-Anomaly-Inspector
This repository contains a PowerShell-based static analysis tool for detecting path traversal anomalies in RAR archives related to CVE-2025-8088. It does not exploit the vulnerability but scans for indicators of potential exploitation.
Classification
Scanner 95%
Target:
WinRAR for Windows ≤ 7.12
No auth needed
Prerequisites:
Windows environment · PowerShell 5.1+ · 7-Zip for listing files
nomisec
SUSPICIOUS
1 stars
by Markusino488 · poc
https://github.com/Markusino488/cve-2025-8088
The repository claims to be a tool for CVE-2025-8088 but lacks actual exploit code, instead pushing external downloads via GitHub raw links. The README is vague and marketing-oriented, while the provided Python scripts contain generic networking code unrelated to the CVE.
Classification
Suspicious 90%
Target:
unspecified
No auth needed
nomisec
SCANNER
1 stars
by pescada-dev · poc
https://github.com/pescada-dev/-CVE-2025-8088
This repository contains a PowerShell script that scans for the presence of WinRAR and checks if the installed version is vulnerable to CVE-2025-8088. It does not exploit the vulnerability but detects whether the system is affected.
Classification
Scanner 100%
Target:
WinRAR < 7.13
No auth needed
Prerequisites:
WinRAR installed on the system
nomisec
WORKING POC
1 stars
by DeepBlue-dot · client-side
https://github.com/DeepBlue-dot/CVE-2025-8088-WinRAR-Startup-PoC
This repository contains a functional Python-based proof-of-concept exploit for CVE-2025-8088, which leverages WinRAR's improper handling of Alternate Data Streams (ADS) and path traversal to write arbitrary files to the Windows Startup folder for persistence. The exploit creates a malicious RAR archive that, when extracted, places a payload in the Startup folder, achieving automatic execution on system boot.
Classification
Working Poc 95%
Target:
WinRAR versions prior to 7.00 (build 10)
No auth needed
Prerequisites:
Windows OS with NTFS file system · Python 3.7 or higher · WinRAR installed (rar.exe accessible)
nomisec
WORKING POC
1 stars
by Shinkirou789 · poc
https://github.com/Shinkirou789/Cve-2025-8088-WinRar-vulnerability
This repository contains a functional exploit for CVE-2025-8088, targeting WinRAR via a path traversal vulnerability in RAR file processing. The exploit creates a malicious RAR archive that leverages Alternate Data Streams (ADS) to achieve arbitrary file write, leading to potential remote code execution (RCE) when the archive is extracted.
Classification
Working Poc 95%
Target:
WinRAR (version not explicitly specified, but likely affects multiple versions)
No auth needed
Prerequisites:
WinRAR installed on the target system · Ability to deliver the malicious RAR file to the victim · Victim interaction to extract the archive
nomisec
WORKING POC
by Ismael-20223 · poc
https://github.com/Ismael-20223/CVE-2025-8088
This repository contains a functional exploit generator for CVE-2025-8088, a WinRAR vulnerability that allows arbitrary code execution when a victim extracts a malicious RAR archive. The exploit creates a crafted RAR file that leverages path traversal and ADS (Alternate Data Streams) to execute a payload.
Classification
Working Poc 95%
Target:
WinRAR versions prior to the official patch (specifically targeting 7.12 and earlier)
No auth needed
Prerequisites:
WinRAR installed on the target system · Victim must extract the malicious RAR file
gitlab
WORKING POC
by patricnilackshan · poc
https://gitlab.com/patricnilackshan/CVE-2025-8088-WinRAR-POC
This repository contains a functional Python-based PoC for CVE-2025-8088, a path traversal vulnerability in WinRAR ≤ 7.12. The exploit leverages alternate data streams (ADSes) and crafted RAR archives to place malicious files outside the intended extraction directory.
Classification
Working Poc 95%
Target:
WinRAR ≤ 7.12
No auth needed
Prerequisites:
Python · rar.exe (WinRAR command-line tool) · decoy file · payload file
gitlab
WORKING POC
by ThemeHackers · poc
https://gitlab.com/ThemeHackers/CVE-2025-8088-Winrar-Tool
This repository contains a functional exploit tool for CVE-2025-8088, a WinRAR path traversal vulnerability. It leverages NTFS Alternate Data Streams (ADS) and RAR5 header manipulation to create malicious archives that can place payloads in arbitrary locations, such as the Windows startup folder.
Classification
Working Poc 95%
Target:
WinRAR (version not specified)
No auth needed
Prerequisites:
Python 3.6+ · WinRAR CLI · customtkinter · NTFS filesystem
nomisec
WORKING POC
by xi0onamdev · poc
https://github.com/xi0onamdev/WinRAR-CVE-2025-8088-Exploitation-Toolkit
This repository contains a functional exploit toolkit for CVE-2025-8088, a WinRAR path traversal vulnerability. It leverages NTFS Alternate Data Streams (ADS) and RAR5 header manipulation to create malicious archives that achieve arbitrary file write and persistence via the Windows Startup folder.
Classification
Working Poc 95%
Target:
WinRAR (version not explicitly specified, but likely affects multiple versions)
No auth needed
Prerequisites:
Python 3.8+ · PyQt6 · WinRAR CLI installed and in system PATH · NTFS filesystem for ADS support
nomisec
WORKING POC
by nhattanhh · client-side
https://github.com/nhattanhh/CVE-2025-8088
This repository contains a functional exploit for CVE-2025-8088, a path traversal vulnerability in WinRAR that allows arbitrary file write via crafted RAR archives. The PoC creates a malicious archive that leverages Alternate Data Streams (ADS) and multiple traversal depths to drop a payload into the Windows Startup folder.
Classification
Working Poc 95%
Target:
WinRAR (version not specified)
No auth needed
Prerequisites:
WinRAR installed on the target system · Victim must extract the malicious RAR archive
nomisec
WORKING POC
by techcorp · client-side
https://github.com/techcorp/CVE-2025-8088-Exploit
This repository contains a functional exploit for CVE-2025-8088, leveraging path traversal in RAR file processing to achieve arbitrary file write. The exploit generates a malicious RAR archive with crafted stream names and path traversal sequences to drop a payload in the Windows Startup folder.
Classification
Working Poc 90%
Target:
WinRAR (version not specified)
No auth needed
Prerequisites:
Victim must extract the malicious RAR archive
github
WORKING POC
by papcaii2004 · pythonlocal
https://github.com/papcaii2004/CVE-2025-8088-WinRAR-builder
This repository contains a functional exploit for CVE-2025-8088, a path traversal vulnerability in WinRAR versions 7.12 and below. The exploit leverages ADS (Alternate Data Streams) and manipulated RAR headers to write payloads to arbitrary locations, such as the Windows startup folder, achieving persistence.
Classification
Working Poc 95%
Target:
WinRAR <= 7.12
No auth needed
Prerequisites:
Python 3.x · WinRAR installed on the target system · Victim must extract the malicious RAR archive
nomisec
WORKING POC
by undefined-name12 · client-side
https://github.com/undefined-name12/CVE-2025-8088-Winrar
This repository contains a functional exploit for CVE-2025-8088, a path traversal vulnerability in WinRAR. The exploit leverages NTFS Alternate Data Streams (ADS) and RAR5 header manipulation to create malicious archives that can place payloads in arbitrary locations, such as the Windows startup folder.
Classification
Working Poc 95%
Target:
WinRAR (version not specified, but likely affects multiple versions)
No auth needed
Prerequisites:
WinRAR installed on the target system · NTFS file system · Python 3.6+ for the exploit tool
nomisec
WORKING POC
by IsmaelCosma · remote
https://github.com/IsmaelCosma/CVE-2025-8088
This repository contains a functional exploit generator for CVE-2025-8088, a WinRAR vulnerability that allows arbitrary code execution when a victim extracts a malicious RAR archive. The exploit creates a crafted RAR file embedding a payload that executes upon extraction.
Classification
Working Poc 95%
Target:
WinRAR versions prior to the official patch (specifically targeting 7.12 and earlier)
No auth needed
Prerequisites:
WinRAR installed on the target system · Victim must extract the malicious RAR file
nomisec
WORKING POC
by Jessica74016 · poc
https://github.com/Jessica74016/CVE-2025-8088
This repository contains a functional proof-of-concept exploit for CVE-2025-8088, a path traversal vulnerability in WinRAR via NTFS Alternate Data Streams (ADS). The exploit generates a malicious RAR archive that, when extracted, writes arbitrary files to sensitive system locations, such as the Windows Startup folder.
Classification
Working Poc 95%
Target:
WinRAR ≤ 7.12
No auth needed
Prerequisites:
WinRAR ≤ 7.12 · Windows NTFS filesystem · Python 3.6+ · colorama library
nomisec
WORKING POC
by ghostn4444 · poc
https://github.com/ghostn4444/CVE-2025-8088
The repository contains a functional PowerShell exploit for CVE-2025-8088, which deploys a stealthy LNK payload with registry persistence upon detecting a marker file. The exploit includes anti-analysis checks and obfuscation techniques to evade detection.
Classification
Working Poc 95%
Target:
Windows (specific version not specified)
No auth needed
Prerequisites:
Access to the target system · Ability to write files to a monitored directory