CVE-2025-11002
📋 TL;DR
A directory traversal vulnerability in 7-Zip's ZIP file parsing allows remote attackers to execute arbitrary code by crafting malicious ZIP archives containing symbolic links. This affects all systems running vulnerable versions of 7-Zip that process untrusted ZIP files. Attackers can exploit this to gain code execution with the privileges of the user or service running 7-Zip.
💻 Affected Systems
- 7-Zip
📦 What is this software?
7 Zip by 7 Zip
⚠️ Risk & Real-World Impact
Worst Case
Remote code execution with system-level privileges leading to complete system compromise, data exfiltration, and lateral movement within the network.
Likely Case
Arbitrary code execution with user-level privileges, potentially leading to data theft, ransomware deployment, or installation of persistent backdoors.
If Mitigated
Limited impact due to proper access controls, sandboxing, or network segmentation preventing lateral movement and privilege escalation.
🎯 Exploit Status
Exploitation requires user interaction to open a malicious ZIP file, but no authentication is needed. The vulnerability is in file parsing logic, making reliable exploitation straightforward.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 24.08 and later
Vendor Advisory: https://www.7-zip.org/history.txt
Restart Required: No
Instructions:
1. Download 7-Zip version 24.08 or later from https://www.7-zip.org/download.html
2. Run the installer and follow the installation prompts
3. Replace existing 7-Zip installations with the updated version
🔧 Temporary Workarounds
Disable ZIP file processing
windowsPrevent 7-Zip from handling ZIP files by removing file associations
Windows: Use 'Default Programs' in Control Panel to change ZIP file associations to another application
Use application whitelisting
allRestrict execution of 7-Zip to trusted directories only
Windows: Configure AppLocker or Windows Defender Application Control rules
Linux: Use SELinux/AppArmor policies
🧯 If You Can't Patch
- Implement strict file upload controls to block ZIP files from untrusted sources
- Run 7-Zip in a sandboxed environment with limited privileges and no network access
🔍 How to Verify
Check if Vulnerable:
Check 7-Zip version: if version is earlier than 24.08, the system is vulnerable
Check Version:
Windows: "7z" command or check Help > About in GUI
Linux: "7z" or check package manager
Verify Fix Applied:
Confirm 7-Zip version is 24.08 or later and test with known safe ZIP files
📡 Detection & Monitoring
Log Indicators:
- Unusual process creation from 7-Zip executable
- File system access to unexpected directories by 7-Zip process
Network Indicators:
- Outbound connections from 7-Zip process to unknown IPs
- Unusual network traffic patterns following ZIP file processing
SIEM Query:
Process creation where parent process contains '7z' and child process is suspicious (cmd.exe, powershell.exe, etc.)