Wednesday, November 19, 2025

Hackers Actively Exploiting 7-Zip Symbolic Hyperlink–Primarily based RCE Vulnerability (CVE-2025-11001)


Nov 19, 2025Ravie LakshmananVulnerability / Menace Intelligence

A just lately disclosed safety flaw impacting 7-Zip has come underneath energetic exploitation within the wild, in response to an advisory issued by the U.Ok. NHS England Digital on Tuesday.

The vulnerability in query is CVE-2025-11001 (CVSS rating: 7.0), which permits distant attackers to execute arbitrary code. It has been addressed in 7-Zip model 25.00 launched in July 2025.

“The particular flaw exists throughout the dealing with of symbolic hyperlinks in ZIP recordsdata. Crafted knowledge in a ZIP file could cause the method to traverse to unintended directories,” Pattern Micro’s Zero Day Initiative (ZDI) mentioned in an alert launched final month. “An attacker can leverage this vulnerability to execute code within the context of a service account.”

Ryota Shiga of GMO Flatt Safety Inc., together with the corporate’s synthetic intelligence (AI)-powered AppSec Auditor Takumi, has been credited with discovering and reporting the vulnerability.

DFIR Retainer Services

It is price noting that 7-Zip 25.00 additionally resolves one other flaw, CVE-2025-11002 (CVSS rating: 7.0), that enables for distant code execution by benefiting from improper dealing with of symbolic hyperlinks inside ZIP archives, leading to listing traversal. Each shortcomings had been launched in model 21.02.

“Lively exploitation of CVE-2025-11001 has been noticed within the wild,” NHS England Digital mentioned. Nevertheless, there are at the moment no particulars obtainable on the way it’s being weaponized, by whom, and in what context.

On condition that there exists proof-of-concept (PoC) exploits, it is important that 7-Zip customers transfer rapidly to use the mandatory fixes as quickly as attainable, if not already, for optimum safety.

“This vulnerability can solely be exploited from the context of an elevated consumer / service account or a machine with developer mode enabled,” safety researcher Dominik (aka pacbypass), who launched the PoC, mentioned in a publish detailing the failings. “This vulnerability can solely be exploited on Home windows.”

Related Articles

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Latest Articles

PHP Code Snippets Powered By : XYZScripts.com