CVE-2025-33026
📋 TL;DR
This vulnerability allows attackers to bypass Windows' Mark-of-the-Web protection in PeaZip when extracting files from malicious archives. Users who extract files from untrusted sources (like downloads or email attachments) are affected, potentially leading to arbitrary code execution. The vulnerability is disputed due to concerns about security-warning habituation and metadata control scope.
💻 Affected Systems
- PeaZip
📦 What is this software?
Peazip by Peazip
⚠️ Risk & Real-World Impact
Worst Case
Arbitrary code execution with current user privileges, potentially leading to full system compromise, data theft, or ransomware deployment.
Likely Case
Malware execution from extracted files that appear safe due to missing security warnings, leading to system infection or credential theft.
If Mitigated
Files are blocked by other security controls (antivirus, application whitelisting) or user avoids suspicious archives, limiting impact.
🎯 Exploit Status
Exploitation requires user to extract files from crafted archive; no authentication needed. Weaponization status unclear from available references.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Not specified
Vendor Advisory: https://peazip.github.io/peazip-64bit.html
Restart Required: No
Instructions:
1. Check PeaZip website for updates beyond version 10.4.0
2. Download and install latest version if available
3. No restart required for PeaZip update
🔧 Temporary Workarounds
Use alternative extraction method
windowsExtract suspicious archives using Windows built-in tools or other archivers that properly propagate Mark-of-the-Web
Manual security check
windowsRight-click extracted files, check Properties > Security to verify Zone.Identifier is present for internet-sourced files
🧯 If You Can't Patch
- Restrict PeaZip usage to trusted archives only; avoid extracting files from untrusted sources
- Implement application control/whitelisting to block execution of unexpected binaries from user directories
🔍 How to Verify
Check if Vulnerable:
Check PeaZip version: if ≤10.4.0 and on Windows, likely vulnerable. Test by extracting internet-downloaded archive and checking if extracted files have Zone.Identifier.
Check Version:
Open PeaZip > Help > About or check program properties
Verify Fix Applied:
Verify PeaZip version >10.4.0 if patch released. Test extraction of internet-sourced archive confirms Zone.Identifier propagates to extracted files.
📡 Detection & Monitoring
Log Indicators:
- Unusual process execution from recently extracted archive locations
- PeaZip process spawning unexpected child processes
Network Indicators:
- Outbound connections from processes launched from user download/extraction directories
SIEM Query:
Process creation where parent_process contains 'peazip' and process_path contains 'Downloads' or 'Temp'