HomeVulnerabilityHackers Actively Exploiting 7-Zip Symbolic Hyperlink–Based mostly RCE Vulnerability (CVE-2025-11001)

Hackers Actively Exploiting 7-Zip Symbolic Hyperlink–Based mostly RCE Vulnerability (CVE-2025-11001)

A just lately disclosed security flaw impacting 7-Zip has come below energetic exploitation within the wild, in keeping with an advisory issued by the U.Okay. NHS England Digital on Tuesday.

The vulnerability in query is CVE-2025-11001 (CVSS rating: 7.0), which permits distant attackers to execute arbitrary code. It has been addressed in 7-Zip model 25.00 launched in July 2025.

“The particular flaw exists inside the dealing with of symbolic hyperlinks in ZIP recordsdata. Crafted knowledge in a ZIP file may cause the method to traverse to unintended directories,” Development Micro’s Zero Day Initiative (ZDI) mentioned in an alert launched final month. “An attacker can leverage this vulnerability to execute code within the context of a service account.”

Ryota Shiga of GMO Flatt Safety Inc., together with the corporate’s synthetic intelligence (AI)-powered AppSec Auditor Takumi, has been credited with discovering and reporting the vulnerability.

DFIR Retainer Services

It is value noting that 7-Zip 25.00 additionally resolves one other flaw, CVE-2025-11002 (CVSS rating: 7.0), that enables for distant code execution by benefiting from improper dealing with of symbolic hyperlinks inside ZIP archives, leading to listing traversal. Each shortcomings had been launched in model 21.02.

See also  Gathid’s new entry mapping tech guarantees reasonably priced and streamlined IAM

“Energetic exploitation of CVE-2025-11001 has been noticed within the wild,” NHS England Digital mentioned. Nonetheless, there are presently no particulars obtainable on the way it’s being weaponized, by whom, and in what context.

Provided that there exists proof-of-concept (PoC) exploits, it is important that 7-Zip customers transfer shortly to use the mandatory fixes as quickly as doable, if not already, for optimum safety.

“This vulnerability can solely be exploited from the context of an elevated person / service account or a machine with developer mode enabled,” security researcher Dominik (aka pacbypass), who launched the PoC, mentioned in a submit detailing the issues. “This vulnerability can solely be exploited on Home windows.”

- Advertisment -spot_img
RELATED ARTICLES

LEAVE A REPLY

Please enter your comment!
Please enter your name here

- Advertisment -

Most Popular