WinRAR 'high-risk' exploit discovered, make sure you update to the latest release

'RARLAB WinRAR Directory Traversal Remote Code Execution Vulnerability' can place files in the Windows Startup folder and cause real damage.

WinRAR 'high-risk' exploit discovered, make sure you update to the latest release
Comment IconFacebook IconX IconReddit Icon
Senior Editor
Published
1 minute & 30 seconds read time
TL;DR: WinRAR has a critical security vulnerability (CVE-2025-6218) allowing remote code execution via directory traversal in Windows versions. This exploit risks sensitive data and system integrity. RARLAB promptly released WinRAR 7.12 Final to fix the issue. Windows users should update immediately to ensure protection.

WinRAR is still one of the most popular compression and decompression platforms, and most users have been using it for years or decades. However, a new report at Trend Micro's Zero Day Initiative has confirmed that the popular app has a significant security exploit.

WinRAR 'high-risk' exploit discovered, make sure you update to the latest release 2

According to the announcement, CVE-2025-6218 has a very high severity rating of 7.8 on the Common Vulnerability Scoring System (CVSS) because it allows "remote attackers to execute arbitrary code on affected installations of RARLAB WinRAR" due to how file paths are handled within archive files. This vulnerability requires user interaction as the exploit can "cause the process to traverse to unintended directories" and execute code.

Yes, this opens the door to accessing sensitive data alongside system files, which can cause harm and make a device unusable. According to RARLAB, the exploit can place files in the Windows Startup folder, "potentially leading to unintended code execution on the next system login."

The good news is that even though the issue was made public a week ago, RARLAB has released WinRAR 7.12 Final, which fixes the 'RARLAB WinRAR Directory Traversal Remote Code Execution Vulnerability' exploit.

In the release notes, the company notes that it only affected Windows-based builds of the app and thanks "whs3-detonator, working with Trend Micro's Zero Day Initiative, for responsibly reporting this vulnerability." If you've got WinRAR installed on your Windows-based machine, update to the latest version as soon as possible.

Software exploits like this occur relatively frequently, so it's always great to see a developer jump on the problem quickly and release a fix in a few days.

Photo of the MSI Gaming RTX 5070 12G Ventus 2X OC Graphics Card
Best Deals: MSI Gaming RTX 5070 12G Ventus 2X OC Graphics Card
Today7 days ago30 days ago
$659.99 USD$700 USD
$868 USD$868 USD
$929.99 CAD$899.99 CAD
$1063.98 CAD$919.99 CAD
£1131.45£1226.27
$659.99 USD$700 USD
$1049$1049
* Prices last scanned 5/8/2026 at 9:30 pm CDT - prices may be inaccurate. As an Amazon Associate, we earn from qualifying purchases. We earn affiliate commission from any Newegg or PCCG sales.
News Sources:win-rar.com and tomshardware.com

Senior Editor

Email IconX IconLinkedIn Icon

Kosta is a veteran gaming journalist that cut his teeth on well-respected Aussie publications like PC PowerPlay and HYPER back when articles were printed on paper. A lifelong gamer since the 8-bit Nintendo era, it was the CD-ROM-powered 90s that cemented his love for all things games and technology. From point-and-click adventure games to RTS games with full-motion video cut-scenes and FPS titles referred to as Doom clones. Genres he still loves to this day. Kosta is also a musician, releasing dreamy electronic jams under the name Kbit.

Follow TweakTown on Google News
Newsletter Subscription