// For flags

CVE-2018-20250

WinRAR Absolute Path Traversal Vulnerability

Severity Score

7.8
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

26
*Multiple Sources

Exploited in Wild

Yes
*KEV

Decision

Act
*SSVC
Descriptions

In WinRAR versions prior to and including 5.61, There is path traversal vulnerability when crafting the filename field of the ACE format (in UNACEV2.dll). When the filename field is manipulated with specific patterns, the destination (extraction) folder is ignored, thus treating the filename as an absolute path.

En WinRAR, en versiones anteriores a la 5.61, hay una vulnerabilidad de salto de directorio al manipular el campo "filename" del formato ACE (en UNACEV2.dll). Cuando este campo se manipula con patrones específicos, la carpeta de destino (extracción) se ignora, tratando el nombre de archivo como ruta absoluta.

WinRAR Absolute Path Traversal vulnerability leads to Remote Code Execution

*Credits: N/A
CVSS Scores
Attack Vector
Local
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Network
Attack Complexity
Medium
Authentication
None
Confidentiality
Partial
Integrity
Partial
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:Act
Exploitation
Active
Automatable
No
Tech. Impact
Total
* Organization's Worst-case Scenario
Timeline
  • 2018-12-19 CVE Reserved
  • 2019-02-05 CVE Published
  • 2019-02-22 First Exploit
  • 2022-02-15 Exploited in Wild
  • 2022-08-15 KEV Due Date
  • 2025-02-07 CVE Updated
  • 2025-03-18 EPSS Updated
CWE
  • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
  • CWE-36: Absolute Path Traversal
CAPEC
References (31)
URL Date SRC
https://packetstorm.news/files/id/152618 2019-04-24
https://www.exploit-db.com/exploits/46756 2025-02-07
https://www.exploit-db.com/exploits/46552 2025-02-07
https://github.com/WyAtu/CVE-2018-20250 2019-02-22
https://github.com/QAX-A-Team/CVE-2018-20250 2019-02-22
https://github.com/easis/CVE-2018-20250-WinRAR-ACE 2019-03-01
https://github.com/STP5940/CVE-2018-20250 2019-02-28
https://github.com/arkangel-dev/CVE-2018-20250-WINRAR-ACE-GUI 2019-05-10
https://github.com/nmweizi/CVE-2018-20250-poc-winrar 2019-02-22
https://github.com/blunden/UNACEV2.DLL-CVE-2018-20250 2019-02-22
https://github.com/zeronohacker/CVE-2018-20250 2021-08-03
https://github.com/likescam/CVE-2018-20250 2019-02-22
https://github.com/tzwlhack/CVE-2018-20250 2019-02-22
https://github.com/AeolusTF/CVE-2018-20250 2019-03-11
https://github.com/tannlh/CVE-2018-20250 2023-12-26
https://github.com/LamSonBinh/CVE-2018-20250 2024-04-26
https://github.com/joydragon/Detect-CVE-2018-20250 2019-03-19
https://github.com/eastmountyxz/CVE-2018-20250-WinRAR 2020-05-19
https://github.com/technicaldada/hack-winrar 2023-01-02
https://github.com/Ektoplasma/ezwinrar 2023-03-14
https://github.com/likekabin/CVE-2018-20250 2019-04-25
https://github.com/H4xl0r/WinRar_ACE_exploit_CVE-2018-20250 2019-05-16
https://github.com/lxg5763/cve-2018-20250 2020-05-13
http://packetstormsecurity.com/files/152618/RARLAB-WinRAR-ACE-Format-Input-Validation-Remote-Code-Execution.html 2025-02-07
https://github.com/blau72/CVE-2018-20250-WinRAR-ACE 2025-02-07
https://research.checkpoint.com/extracting-code-execution-from-winrar 2025-02-07
URL Date SRC
URL Date SRC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Rarlab
Search vendor "Rarlab"
Winrar
Search vendor "Rarlab" for product "Winrar"
<= 5.61
Search vendor "Rarlab" for product "Winrar" and version " <= 5.61"
-
Affected