WinRAR Actively Exploited – Patch Now

Threats
Vulnerabilities

WinRAR Actively Exploited – Patch Now


by Mike Puglia

3 min read


A WinRAR vulnerability published (CVE-2025-8088) which allows attackers to execute arbitrary code by crafting malicious archive files. This vulnerability actively being exploited in the wild and was discovered by Anton Cherepanov, Peter Košinár, and Peter Strýček from ESET. WinRaR does NOT have auto-update patching capabilities, meaning interaction by users or IT is required to remediate this vulnerability. Organizations should manually patch and update to version 7.13 or higher.

WinRAR is a commonly used compression/archive/extractor tool used to create and extract ZIP or RAR archives. In 2023 a similar WinRAR vulnerability was widely exploited by attackers due to its large install base within SMBs and MSPs.

Currently, we are seeing only 5% of systems have updated WinRAR to 7.13.


Vulnerability Information

Description: WinRAR versions 7.12 and earlier has a vulnerability that allows an attacker to create an archive that, when the user extracts it, can write arbitrary files to sensitive locations – such as the Windows Startup folder – allowing malware to be executed on the next restart.

In the wild, attackers have been observed sending phishing emails with zip/rar attachments that exploit this vulnerability when the user extracts the file contents using WinRAR. The user is shown a legitimate document to lower suspicion while the malicious file is silently written.


Our Response

Datto EDR and RocketCyber Managed SOC both have deployed rules to detect the misuse of WinRAR and their customers will be notified if an exploitation occurs.


Recommended Actions

Using Datto RMM

Run an inventory in your RMM to find vulnerable versions. As an example, Datto RMM users can find a software inventory report within Analytics / Reports / Inventory:

Using VSAX

Run a report by going to Advanced Reporting ->Audit -> Applications and filter by Application Name – WinRAR:

Using Security Tools

Vulnerability Scanners and EDR products often collect installed software version information. Within Datto EDR you can find installed application versions within Analysis:Applications or Search:Applications.

Using Powershell

You can also find vulnerable versions by running the following powershell command on your systems:

> Method 1 (Local):
Get-WmiObject -Class Win32_Product | where name -match WinRar | select Name, Version
> Method 1 (Remote):
$dnsname = "workstation1.kaseya.internal"
Get-WmiObject -Class Win32_Product -ComputerName $dnsname | where name -match "WinRar" | select PSComputerName, Name, Version
> Method 2 – Query Registry
$InstalledSoftware = Get-ChildItem "HKCU:\Software\Microsoft\Windows\CurrentVersion\Uninstall"
foreach ($obj in $InstalledSoftware) { "$($obj.GetValue('DisplayName')) $($obj.GetValue('DisplayVersion'))" } 

Additionally, the following Powershell script will check the version and update WinRAR to 7.13 if it is installed and running 7.12 or earlier (Please review the script in detail prior to running in a production environment as it will make changes to an installed application):

Mike Puglia

General Manager, Security Products

Mike Puglia brings over 25 years of technology, strategy, and cybersecurity experience to his role as Kaseya’s General Manager of Security Products. He is responsible for all products across Kaseya’s portfolio of security solutions.

Prior to joining Kaseya, Mike led the technical program management integration of real-time collaboration technologies into Salesforce’s Chatter Social Enterprise platform. Earlier in his career, Mike served in technical and product roles at applications security company Veracode, database security company Lumigent Technologies and network security Bluesocket.

Mike holds a Bachelor of Science in Electrical Engineering from the University of New Hampshire and an MBA from the Carroll Graduate School of Management at Boston College.