Skip to main content

WinRAR users are urged to update to version 7.12 immediately after the discovery of a critical security vulnerability that affects older versions of the popular Windows file compression software. The vulnerability, officially designated CVE-2025-6218, allows attackers to bypass WinRAR’s built-in security mechanisms, increasing the risk that malicious actors could execute malware on compromised systems. Security outlet BleepingComputer reported that the flaw could have serious consequences if exploited.

The vulnerability was first reported to the Zero Day Initiative on June 5th, 2025, and WinRAR responded swiftly by releasing a patched beta version 7.12 beta 1 on June 24th. This update not only fixes the main security issue but also addresses two other minor bugs. According to the changelog published by WinRAR, the vulnerability enables attackers to craft specially designed archive files that cause WinRAR—or its related tools like UnRAR and UnRAR.dll—to extract files into unauthorized system directories instead of the user-specified locations. This could allow malicious files to be placed stealthily in sensitive areas of the operating system, enabling attackers to execute harmful code without user knowledge or consent.

Although there are currently no reports of this exploit being actively used in cyberattacks, security experts strongly recommend that all WinRAR users update their software immediately to the latest version to prevent potential compromise. The incident highlights the importance of regularly updating widely used software tools, especially those that interact with files from external sources, which remain a common vector for malware distribution.