Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Alerts

7-Zip Flaw Enables Arbitrary Code Run

August 12, 2025
Reading Time: 3 mins read
in Alerts
Yes24 Down After Cyberattack

The vulnerability, identified as CVE-2025-55188, is an arbitrary file write flaw present in 7-Zip versions before 25.01. This security issue is rooted in how the software handles symbolic links during the extraction process. An attacker can create a maliciously crafted archive containing symbolic links that point to sensitive system files. When a user extracts this archive, 7-Zip follows these links and overwrites the intended target files instead of placing them in the designated extraction directory. This can be exploited to achieve unauthorized access or code execution by corrupting critical system files.

Exploitation on Different Operating Systems

The exploitation of this vulnerability is slightly different depending on the operating system. On Linux, the process is more straightforward; an attacker needs the target to be using a vulnerable version of 7-Zip to extract a malicious archive containing symbolic links. On Windows, however, the attack requires additional conditions. For the symbolic links to be created, the 7-Zip extraction process must be running with elevated privileges or in Windows Developer Mode. This makes Windows systems less susceptible but not entirely immune to the attack. The ability to overwrite files like SSH keys or .bashrc files on Linux makes the vulnerability particularly dangerous in a server environment.

Severity and Practical Impact

Despite being assigned a low-severity CVSS score of 2.7, security experts are warning that the practical impact of this vulnerability is much greater. The ability to perform arbitrary file writes can lead to significant compromise of a system, as attackers can overwrite critical files that control system behavior. The attack is made more insidious by 7-Zip’s behavior of displaying the file path before symbolic link resolution. This allows attackers to hide the true destination of their malicious writes from the user. Attackers can also attempt multiple file overwrites during a single extraction, increasing their chances of a successful compromise.

Mitigation and Patching

The only definitive solution to this vulnerability is to update to 7-Zip version 25.01, which was released on August 3, 2025. This new version includes enhanced symbolic link handling and significant security improvements to prevent this type of attack. It also introduces a new command-line switch, -snld20, which can bypass default security checks for administrators who need controlled flexibility. Given 7-Zip’s widespread use, immediate patching is highly recommended for both personal and enterprise systems.

Recommended Security Practices

In addition to updating to the latest version of 7-Zip, several other mitigation strategies are recommended. Users and organizations should avoid extracting archives from untrusted sources. Implementing sandboxed environments for handling unknown files can also provide an additional layer of security. Since 7-Zip lacks an automatic update feature, organizations should also audit their systems to ensure all installations are patched. This vulnerability is the latest in a series of recent security issues found in 7-Zip, highlighting the ongoing need for vigilance and robust security practices when dealing with compressed files.

Reference:

  • Researchers Find GPT-5 Jailbreak, Zero-Click AI Agent Attacks Targeting Cloud and IoT Systems
Tags: August 2025Cyber AlertsCyber Alerts 2025CyberattackCybersecurity
ADVERTISEMENT

Related Posts

Dragon Breath Deploys Roninloader Ghosts

Rondodox Targets XWiki To Grow Botnet

November 17, 2025
Dragon Breath Deploys Roninloader Ghosts

Windows 10 Update Error 800f0922

November 17, 2025
Dragon Breath Deploys Roninloader Ghosts

Dragon Breath Deploys Roninloader Ghosts

November 17, 2025
Imunify360 Flaw Puts Sites At Risk

Imunify360 Flaw Puts Sites At Risk

November 14, 2025
Imunify360 Flaw Puts Sites At Risk

Safery Extension Steals Crypto Wallets

November 14, 2025
Imunify360 Flaw Puts Sites At Risk

ChatGPT Flaw Exposed Core Infrastructure

November 14, 2025

Latest Alerts

Rondodox Targets XWiki To Grow Botnet

Windows 10 Update Error 800f0922

Dragon Breath Deploys Roninloader Ghosts

Imunify360 Flaw Puts Sites At Risk

Safery Extension Steals Crypto Wallets

ChatGPT Flaw Exposed Core Infrastructure

Subscribe to our newsletter

    Latest Incidents

    Logitech Confirms Major Data Breach

    Hackers Steal Maternity Ward Videos

    Checkoutcom Rejects Hackers After Breach

    Hackers Breach NY State Texting Service

    Doordash Hit By October User Data Breach

    Synnovis Reports Data Theft In Attack

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial