A critical zero day vulnerability (CVE- 2025- 8088) has been actively exploited in the wild. Attackers most notably the Russian- aligned APT group “RomCom” (aka Storm- 0978, Void Rabisu, UNC2596) have been distributing malicious RAR files via spear phishing campaigns (often disguised as job application documents). These exploit a directory traversal flaw to drop payloads into Windows Startup folders, enabling remote code execution upon next user login.

All versions of WinRAR up to and including v7.12 are vulnerable.

Update immediately to WinRAR v7.13, released on July 30, 2025, which addresses this vulnerability .
https://www.win-rar.com/whatsnew.html?&L=0 .

  • Deploy WinRAR v7.13 or later across all endpoints. Since WinRAR lacks an auto- update mechanism, this must be done manually.
  • Use endpoint management tools or software inventories to confirm version rollout.
  • Audit recent RAR attachments especially those purporting to be CVs or HR documents and verify their safety.

Remind all users to exercise caution when receiving RAR files via email even from trusted senders. Specifically:

âś… Verify legitimacy before extracting these files, even if the sender seems familiar.