Loading HuntDB...

CVE-2025-6218

HIGH
Published 2025-06-21T00:09:02.884Z
Actions:

Expert Analysis

Professional remediation guidance

Get tailored security recommendations from our analyst team for CVE-2025-6218. We'll provide specific mitigation strategies based on your environment and risk profile.

CVSS Score

V3.0
7.8
/10
CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Base Score Metrics
Exploitability: N/A Impact: N/A

Attack Vector Metrics

Attack Vector
Not Available
Attack Complexity
Not Available
Privileges Required
Not Available
User Interaction
Not Available
Scope
Not Available

Impact Metrics

Confidentiality
Not Available
Integrity
Not Available
Availability
Not Available

Description

RARLAB WinRAR Directory Traversal Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of RARLAB WinRAR. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.

The specific flaw exists within the handling of file paths within archive files. A crafted file path can cause the process to traverse to unintended directories. An attacker can leverage this vulnerability to execute code in the context of the current user. Was ZDI-CAN-27198.

Available Exploits

No exploits available for this CVE.

Related News

No news articles found for this CVE.

Affected Products

GitHub Security Advisories

Community-driven vulnerability intelligence from GitHub

⚠ Unreviewed HIGH

GHSA-8x66-x5gf-2pc8

Advisory Details

RARLAB WinRAR Directory Traversal Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of RARLAB WinRAR. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of file paths within archive files. A crafted file path can cause the process to traverse to unintended directories. An attacker can leverage this vulnerability to execute code in the context of the current user. Was ZDI-CAN-27198.

CVSS Scoring

CVSS Score

7.5

CVSS Vector

CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Advisory provided by GitHub Security Advisory Database. Published: June 23, 2025, Modified: June 23, 2025

Social Media Intelligence

Real-time discussions and threat intelligence from social platforms

3 posts
Reddit 2 days, 14 hours ago
Immediate_Gold9789
Exploit

Nation-State Threats: The Silent War in Cyberspace By CyberDudeBivash – Ruthless, Engineering-Grade Threat Intel https://preview.redd.it/5rp2ofwiz9kf1.png?width=1024&format=png&auto=webp&s=f41f534c1663d45d05fe61e0b745b88f52f2e539 # 🔎 Introduction: Cyber as the Fifth Domain of Warfare Nation-state threats represent the **pinnacle of cyber risk** — advanced, well-funded, and often politically motivated cyber-operations conducted by governments or state-backed actors. Unlike ransomware gangs …

1
1.0
View Original High Risk
Reddit 1 week, 3 days ago
crstux
Exploit

🔥 Top 10 Trending CVEs (13/08/2025) Here’s a quick breakdown of the 10 most interesting vulnerabilities trending today: **1. [CVE-2024-53141](https://nvd.nist.gov/vuln/detail/CVE-2024-53141)** - 📝 In the Linux kernel, the following vulnerability has been resolved: netfilter: ipset: add missing range check in bitmap_ip_uadt When tb[IPSET_ATTR_IP_TO] is not present but tb[IPSET_ATTR_CIDR] exists, the values …

2
2.0
View Original High Risk
Reddit 1 week, 4 days ago
_cybersecurity_
Exploit

Critical WinRAR Zero-Day Vulnerability Found – Update Now **A severe zero-day vulnerability in WinRAR, affecting versions up to 7.12, is currently being exploited; users must update to version 7.13 immediately.** **Key Points:** - The vulnerability, tracked as CVE-2025-8088, scores 8.8 on the CVSS scale. - It allows attackers to execute …

6
2
10.0
View Original High Risk

References

Published: 2025-06-21T00:09:02.884Z
Last Modified: 2025-06-23T20:15:40.017Z
Copied to clipboard!