CVE-2025-11001

7.8 HIGH

📋 TL;DR

This vulnerability in 7-Zip allows remote attackers to execute arbitrary code by exploiting directory traversal through specially crafted ZIP files containing symbolic links. Attackers can leverage this to run code with the privileges of the service account processing the ZIP file. All users of affected 7-Zip versions are vulnerable when processing untrusted ZIP archives.

💻 Affected Systems

Products:
  • 7-Zip
Versions: Versions prior to 24.08
Operating Systems: Windows, Linux, macOS
Default Config Vulnerable: ⚠️ Yes
Notes: All default installations are vulnerable when processing ZIP files. The vulnerability affects both GUI and command-line versions.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with remote code execution as the service account, potentially leading to data theft, ransomware deployment, or complete system takeover.

🟠

Likely Case

Local privilege escalation or arbitrary file write/read through directory traversal, enabling further exploitation or data exfiltration.

🟢

If Mitigated

Limited impact with proper sandboxing and least privilege configurations, potentially only file system access within restricted directories.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires user interaction to open a malicious ZIP file, but no authentication is needed. The vulnerability is in the core ZIP parsing logic.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 24.08 and later

Vendor Advisory: https://www.7-zip.org/history.txt

Restart Required: No

Instructions:

1. Download latest 7-Zip version from official website. 2. Uninstall current version. 3. Install new version. 4. Verify installation with version check.

🔧 Temporary Workarounds

Disable ZIP processing

all

Remove or disable 7-Zip's association with ZIP files to prevent automatic processing

Windows: Control Panel > Default Programs > Associate file type > Remove .zip from 7-Zip
Linux: update-alternatives --config x-archive-manager

Use alternative archive tools

all

Temporarily use other archive software that is not vulnerable

🧯 If You Can't Patch

  • Implement application whitelisting to block 7-Zip execution
  • Deploy endpoint protection with behavior monitoring for suspicious file operations

🔍 How to Verify

Check if Vulnerable:

Check 7-Zip version: 7z.exe --version (Windows) or 7z --version (Linux/macOS). If version is below 24.08, system is vulnerable.

Check Version:

7z --version

Verify Fix Applied:

After updating, run version check command and confirm version is 24.08 or higher.

📡 Detection & Monitoring

Log Indicators:

  • Unusual process creation from 7-Zip
  • File operations outside expected directories
  • Multiple failed attempts to access system files

Network Indicators:

  • Downloads of ZIP files from untrusted sources
  • Outbound connections from 7-Zip process

SIEM Query:

ProcessName="7z*" AND (CommandLine CONTAINS ".." OR FilePath CONTAINS "..")

🔗 References

📤 Share & Export