Active Exploitation of 7-Zip Symbolic Link RCE Vulnerability (CVE-2025-11001)
Summary
Hide ▲
Show ▼
Hackers are actively exploiting a symbolic link-based remote code execution vulnerability (CVE-2025-11001) in 7-Zip, which affects the handling of ZIP files and allows directory traversal. The flaw was patched in version 25.00 released in July 2025. NHS England has observed active exploitation of this vulnerability in the wild. The vulnerability is specific to Windows systems and requires elevated privileges or developer mode to be exploited.
Timeline
-
19.11.2025 18:27 2 articles · 1d ago
Active Exploitation of 7-Zip Symbolic Link RCE Vulnerability (CVE-2025-11001)
Hackers are actively exploiting a symbolic link-based remote code execution vulnerability (CVE-2025-11001) in 7-Zip, which affects the handling of ZIP files and allows directory traversal. The flaw was patched in version 25.00 released in July 2025. NHS England has observed active exploitation of this vulnerability in the wild. The vulnerability is specific to Windows systems and requires elevated privileges or developer mode to be exploited.
Show sources
- Hackers Actively Exploiting 7-Zip Symbolic Link–Based RCE Vulnerability (CVE-2025-11001) — thehackernews.com — 19.11.2025 18:27
- Recent 7-Zip Vulnerability Exploited in Attacks — www.securityweek.com — 20.11.2025 12:41
Information Snippets
-
CVE-2025-11001 has a CVSS score of 7.0 and allows remote code execution via improper handling of symbolic links in ZIP files.
First reported: 19.11.2025 18:272 sources, 2 articlesShow sources
- Hackers Actively Exploiting 7-Zip Symbolic Link–Based RCE Vulnerability (CVE-2025-11001) — thehackernews.com — 19.11.2025 18:27
- Recent 7-Zip Vulnerability Exploited in Attacks — www.securityweek.com — 20.11.2025 12:41
-
The vulnerability was discovered by Ryota Shiga of GMO Flatt Security Inc. and their AI-powered AppSec Auditor Takumi.
First reported: 19.11.2025 18:272 sources, 2 articlesShow sources
- Hackers Actively Exploiting 7-Zip Symbolic Link–Based RCE Vulnerability (CVE-2025-11001) — thehackernews.com — 19.11.2025 18:27
- Recent 7-Zip Vulnerability Exploited in Attacks — www.securityweek.com — 20.11.2025 12:41
-
7-Zip version 25.00 also addresses another flaw, CVE-2025-11002, which has a similar CVSS score and exploitation vector.
First reported: 19.11.2025 18:272 sources, 2 articlesShow sources
- Hackers Actively Exploiting 7-Zip Symbolic Link–Based RCE Vulnerability (CVE-2025-11001) — thehackernews.com — 19.11.2025 18:27
- Recent 7-Zip Vulnerability Exploited in Attacks — www.securityweek.com — 20.11.2025 12:41
-
Proof-of-concept (PoC) exploits for the vulnerability are publicly available.
First reported: 19.11.2025 18:272 sources, 2 articlesShow sources
- Hackers Actively Exploiting 7-Zip Symbolic Link–Based RCE Vulnerability (CVE-2025-11001) — thehackernews.com — 19.11.2025 18:27
- Recent 7-Zip Vulnerability Exploited in Attacks — www.securityweek.com — 20.11.2025 12:41
-
The vulnerability can only be exploited on Windows systems with elevated privileges or developer mode enabled.
First reported: 19.11.2025 18:272 sources, 2 articlesShow sources
- Hackers Actively Exploiting 7-Zip Symbolic Link–Based RCE Vulnerability (CVE-2025-11001) — thehackernews.com — 19.11.2025 18:27
- Recent 7-Zip Vulnerability Exploited in Attacks — www.securityweek.com — 20.11.2025 12:41
-
NHS England has observed active exploitation of CVE-2025-11001 in the wild.
First reported: 20.11.2025 12:411 source, 1 articleShow sources
- Recent 7-Zip Vulnerability Exploited in Attacks — www.securityweek.com — 20.11.2025 12:41
-
The vulnerability impacts 7-Zip versions 21.02 to 24.09 and requires administrative privileges for exploitation.
First reported: 20.11.2025 12:411 source, 1 articleShow sources
- Recent 7-Zip Vulnerability Exploited in Attacks — www.securityweek.com — 20.11.2025 12:41
-
The flaw allows attackers to write files outside the intended extraction folder, potentially enabling arbitrary code execution.
First reported: 20.11.2025 12:411 source, 1 articleShow sources
- Recent 7-Zip Vulnerability Exploited in Attacks — www.securityweek.com — 20.11.2025 12:41
Similar Happenings
Active Exploitation of Multiple Critical Vulnerabilities in Gladinet and TrioFox
Active exploitation of critical vulnerabilities in Gladinet's CentreStack and TrioFox products continues. The zero-day vulnerability, CVE-2025-11371, is an unauthenticated local file inclusion bug that allows unintended disclosure of system files. This flaw affects all versions prior to and including 16.7.10368.56560. The vulnerability has been exploited to retrieve the machine key from the application Web.config file, enabling remote code execution via a ViewState deserialization vulnerability. Three customers have been impacted so far. A patch for the zero-day vulnerability CVE-2025-11371 is now available in CentreStack version 16.10.10408.56683. Users are advised to upgrade to this version or, if upgrading is not possible, disable the "temp" handler within the Web.config file for UploadDownloadProxy to mitigate the risk. The vendor, Gladinet, has been notified and is working on a fix. The vulnerability was detected by researchers at Huntress on September 27, 2025. The flaw was exploited to obtain a machine key and execute code remotely. The attack used an older deserialization vulnerability (CVE-2025-30406) to achieve remote code execution (RCE) through ViewState. The mitigations will impact some functionality of the platform but prevent exploitation of CVE-2025-11371. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added CVE-2025-11371 to its Known Exploited Vulnerabilities (KEV) catalog on November 5, 2025, citing evidence of active exploitation. Federal Civilian Executive Branch (FCEB) agencies are required to apply the necessary fixes by November 25, 2025, to secure their networks. Additionally, a new critical vulnerability, CVE-2025-12480 (CVSS score: 9.8), has been discovered in Gladinet's Triofox file-sharing and remote access platform. This flaw allows attackers to bypass authentication and access configuration pages, resulting in the upload and execution of arbitrary payloads. The threat cluster tracked as UNC6485 has been exploiting this flaw since August 24, 2025. The attackers have used the built-in antivirus feature to execute malicious files and set up encrypted tunnels to command-and-control servers, leveraging remote access tools like Zoho Assist and AnyDesk for further exploitation. The vulnerability CVE-2025-12480 was discovered and reported by Mandiant on November 10. The flaw allows an attacker to gain access to initial setup pages even after setup is complete, enabling the upload and execution of arbitrary payloads. The exploitation campaign started on August 14, 2025. The attackers exploited an HTTP Host header vulnerability by spoofing localhost in requests, bypassing access controls to reach the normally restricted AdminDatabase.aspx setup page. The flaw stemmed from missing origin validation and over-reliance on the host header, allowing unauthenticated remote access to critical configuration pages. The attackers logged in using the newly created Admin account and uploaded malicious files to execute them using the built-in anti-virus feature.
Path Traversal Vulnerability in WinRAR Actively Exploited by Multiple Threat Actors
A path traversal vulnerability in WinRAR (CVE-2025-8088, CVSS 8.8) is being actively exploited in the wild. The flaw allows arbitrary code execution by crafting malicious archive files. The vulnerability affects Windows versions of WinRAR, RAR, UnRAR, portable UnRAR source code, and UnRAR.dll. The issue was discovered by researchers from ESET and addressed in WinRAR version 7.13, released on July 30, 2025. Multiple threat actors, including Paper Werewolf and RomCom, have exploited this vulnerability to target various organizations. The attacks involve phishing emails with malicious archives that, when opened, exploit the vulnerability to write files outside the intended directory and achieve code execution. The payloads include a .NET loader that sends system information to an external server and receives additional malware.