favicon

T4K3.news

WinRAR patch release

WinRAR fixes active zero day CVE-2025-8088 in version 7.13 after attacks on Russian firms.

August 11, 2025 at 05:54 AM
blur WinRAR Zero-Day Under Active Exploitation - Update to Latest Version Immediately

Security researchers warn of an actively exploited WinRAR zero-day tied to Paper Werewolf, with a fix in version 7.13.

WinRAR patches active zero day exploited against Russian firms

WinRAR has released version 7.13 to fix CVE-2025-8088, a high-severity path traversal flaw in the Windows edition that could allow arbitrary code execution when a crafted archive is opened. The vulnerability was under active exploitation and has been connected to operations against Russian firms in July 2025. Security researchers from ESET credited Anton Cherepanov, Peter Kosinar, and Peter Strycek with discovery and reporting.

BI.ZONE researchers link the Paper Werewolf threat group to CVE-2025-8088 and CVE-2025-6218, a Windows directory traversal flaw patched in June 2025. The attackers reportedly used booby-trapped archives with a decoy document to distract victims and deliver a .NET loader that collects system information and contacts a control server for additional payloads. The patch mitigates the flaws for affected users, but it is unclear how widely the exploits have spread in the wild. Separately, 7-Zip patched a low-severity arbitrary file write bug CVE-2025-55188, highlighting overlapping risks across common archiving tools.

Key Takeaways

✔️
Patch 7.13 fixes CVE-2025-8088 in WinRAR on Windows
✔️
CVE-2025-8088 is a high severity vulnerability (CVSS 8.8)
✔️
Attackers tied to Paper Werewolf may have used CVE-2025-8088 with CVE-2025-6218
✔️
Exploitation features directory traversal and crafted archives but patch mitigates risk
✔️
Active exploitation tied to Russian firms in mid 2025
✔️
7-Zip also patched CVE-2025-55188 highlighting broader archiver risk
✔️
Understanding and enforcing timely patching is critical for defense in depth

"Patch now or invite the next breach"

Call to action from security experts

"Threat actors move quickly defenses must keep pace"

Editorial stance on patch cadence

"Patches alone cannot fix a flawed update culture"

Comment on organizational change needed

The incident shows how widely adopted tools can become attack vectors. Patch velocity matters as much as patch availability, and many organizations struggle with timely updates. The linkage to a named threat group also underscores the cyber arms race between defenders and threat groups that reuse earlier flaws.

For businesses, this is a reminder to treat software updates as part of a routine risk management. Organizations should adopt defense in depth: enforce automatic updates where possible, verify patches, segment networks, back up data, train users on phishing and suspicious archives, and monitor for unusual file writes.

Highlights

  • Patch now or invite the next breach
  • Defenses must move faster than the attackers
  • Zero-days demand action not excuses
  • Update cycles matter for every business

Active zero day linked to sensitive geopolitical context

The article discusses an actively exploited vulnerability tied to a named threat group and attacks on Russian firms. Patching timelines and potential public reaction could influence policy, investor sentiment, and cross-border IT practices. The content intersects with political and public reaction sensitivities around cyber activity linked to Russia.

As patches roll out, the basics of cyber hygiene stay essential.

Enjoyed this? Let your friends know!

Related News