A security vulnerability (CVE-2025-55188) in 7-Zip software allows attackers to perform arbitrary file writes during archive extraction, potentially leading to unauthorized code execution. The flaw affects versions prior to 25.01 and exploits improper handling of symbolic links. Attackers can overwrite critical system files, gaining unauthorized access. Despite a low CVSS score of 2.7, the practical impact is significant, as it enables compromise of sensitive files controlling system behavior. The vulnerability is particularly concerning due to 7-Zip's widespread use in enterprise and personal environments. Mitigation includes updating to version 25.01 and avoiding extraction of untrusted archives.
Source: https://cybersecuritynews.com/7-zip-arbitrary-file-write-vulnerability/
TPRM report: https://www.rankiteo.com/company/scmediaus
"id": "scm540081125",
"linkid": "scmediaus",
"type": "Vulnerability",
"date": "8/2025",
"severity": "25",
"impact": "1",
"explanation": "Attack without any consequences"
{'affected_entities': [{'industry': 'Multiple',
'location': 'Global',
'name': '7-Zip Users',
'type': 'Software Users'}],
'attack_vector': 'Malicious archive extraction',
'date_detected': '2025-08-09',
'date_publicly_disclosed': '2025-08-09',
'date_resolved': '2025-08-03',
'description': 'A security vulnerability in 7-Zip software allows attackers '
'to perform arbitrary file writes during archive extraction, '
'potentially leading to code execution on vulnerable systems. '
'The vulnerability affects all versions prior to 25.01 and '
'stems from improper handling of symbolic links during '
'extraction.',
'impact': {'operational_impact': 'Potential unauthorized access and code '
'execution'},
'initial_access_broker': {'entry_point': 'Malicious archive extraction'},
'lessons_learned': 'Importance of immediate patching and vigilant security '
'practices when handling compressed files from untrusted '
'sources.',
'post_incident_analysis': {'corrective_actions': 'Enhanced symbolic link '
'handling in 7-Zip 25.01',
'root_causes': 'Improper handling of symbolic '
'links during archive extraction'},
'recommendations': 'Update to 7-Zip 25.01, avoid extraction of archives from '
'untrusted sources, implement sandboxed environments for '
'handling unknown files.',
'references': [{'source': 'Security Advisory'}],
'response': {'containment_measures': 'Update to 7-Zip 25.01',
'remediation_measures': 'Avoid extraction of archives from '
'untrusted sources, implement sandboxed '
'environments'},
'title': '7-Zip Arbitrary File Write Vulnerability (CVE-2025-55188)',
'type': 'Vulnerability Exploitation',
'vulnerability_exploited': 'CVE-2025-55188'}