Newly discovered WinRAR exploit linked to Russian hacking group, can plant backdoor malware — zero day hack requires manual update to fix

A hacker holding an archive
(Image credit: Pexels / OpenClipArt)

A new vulnerability in file archiving software WinRAR has come to light that can potentially install backdoor malware on Windows PCs. The zero-day vulnerability was discovered by security researchers at ESET and has been tracked as CVE-2025-8088 which is said to be actively exploited by the Russian-linked hacking group RomCom.

The vulnerability has been classified as a directory traversal flaw that allows malicious archives to place files in locations chosen by the attacker. By exploiting it, threat actors can place executable files into autorun directories like the Windows Startup folder at:

%APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup (user-specific)

%ProgramData%\Microsoft\Windows\Start Menu\Programs\StartUp (system-wide)

This allows the placed malicious files to execute automatically the next time the system boots, giving attackers a pathway to remote code execution. Speaking to Bleeping Computer, Anton Cherepanov, Peter Košinár, and Peter Strýček from ESET said that they observed spearphishing emails with attachments containing RAR files to deliver RomCom backdoors.

Flaw acknowledged and fixed - please manually update

The flaw has been acknowledged and fixed via a new WinRAR update with version 7.13. According to the release notes, extracting a file using previous versions of WinRAR, Windows versions of RAR, UnRAR, portable UnRAR source code and UnRAR.dll can be tricked into using a path, defined in a specially crafted archive, instead of user specified path.

Since WinRAR does not include an auto-update feature, it is recommended to manually update the software. Notably, Unix versions of RAR, UnRAR, portable UnRAR source code, UnRAR library, and RAR for Android, are safe from this exploit.

A similar directory traversal flaw was spotted back in June, when independent security researcher “whs3-detonator” reported CVE-2025-6218 to Trend Micro’s Zero Day Initiative. This high-risk vulnerability in WinRAR stemmed from flawed handling of archive file paths, where attackers could craft malicious archives that bypass extraction boundaries and deposit files into unintended locations.

Follow Tom's Hardware on Google News to get our up-to-date news, analysis, and reviews in your feeds. Make sure to click the Follow button.

Kunal Khullar
News Contributor

Kunal Khullar is a contributing writer at Tom’s Hardware.  He is a long time technology journalist and reviewer specializing in PC components and peripherals, and welcomes any and every question around building a PC.

  • Alvar "Miles" Udell
    Has WinRAR become the new Adobe Flash?
    Reply
  • Dr3ams
    I've been uisng WinRAR since 2006. Just updated to version 7.13. Thanks for the warning about the exploit.
    Reply
  • heffeque
    Who uses WinRar when 7zip exists?
    Reply
  • Dr3ams
    heffeque said:
    Who uses WinRar when 7zip exists?
    The same question can be asked about any software competing in the same category. Answers: buisness purchase, objective preference, subjective preference, aversion for open source software, official support, community support, it's free, etc...
    Reply
  • SomeoneElse23
    Dr3ams said:
    The same question can be asked about any software competing in the same category. Answers: buisness purchase, objective preference, subjective preference, aversion for open source software, official support, community support, it's free, etc...
    It seems to me there's a die-hard group of WinRAR supporters.

    I never liked it. (And I'm coming from the days of pkzip.)
    Reply
  • alceryes
    heffeque said:
    Who uses WinRar when 7zip exists?
    I bought a single user WinRAR license over 20 years ago for $7.99 (or something like that).
    I'm gonna get my money's worth, darn it! ;)
    Reply
  • umeng2002_2
    I've moved to 7zip for over a decade.
    Reply
  • Notton
    Ah yes, because 7-zip never had any critical vulnerabilities, ever.
    https://cybersecuritynews.com/7-zip-vulnerability-arbitrary-code/
    Both WinRar and 7-zip fixed these exploits, so what's with the tribalism?
    Reply
  • Udyr
    Notton said:
    Ah yes, because 7-zip never had any critical vulnerabilities, ever.
    https://cybersecuritynews.com/7-zip-vulnerability-arbitrary-code/
    Both WinRar and 7-zip fixed these exploits, so what's with the tribalism?
    Because "my favorite perfect software is better than your favorite trash software"
    Reply