Replace WinRAR now! This safety flaw leaves your PC uncovered to malware
For those who’re nonetheless utilizing WinRAR, it is best to replace to model 7.12 as quickly as potential. A vulnerability labeled CVE-2025-6218 was not too long ago found in older variations of the favored Home windows file compression instrument.
The safety vulnerability in query can reportedly be exploited by hackers to bypass the app’s built-in security measures, rising the danger of malware execution, experiences BleepingComputer.
The problem was first reported on June fifth, 2025 via the Zero Day Initiative, and WinRAR launched a repair for it with model 7.12 beta 1 on June twenty fourth, 2025. The discharge additionally addresses two different minor points.
“When extracting a file, earlier variations of WinRAR, Home windows variations of RAR, UnRAR, moveable UnRAR supply code and UnRAR.dll will be tricked into utilizing a path, outlined in a specifically crafted archive, as a substitute of consumer specified path,” writes WinRAR in its changelog. In different phrases, information could possibly be secretly extracted to system directories and different delicate areas, permitting hackers to execute malicious information in undesirable locations.
Although there are not any identified cases of this exploit being attacked within the wild, it is best to replace WinRAR instantly to remain secure.
This text initially appeared on our sister publication PC för Alla and was translated and localized from Swedish.