RARLAB, the developer of WinRAR, recently patched a critical vulnerability, CVE-2025-31334, that could bypass Windows' Mark of the Web security feature. The flaw, present in versions before 7.11, allowed attackers to execute malicious code without triggering security warnings, potentially giving them control over affected systems. Although creating symbolic links requires admin privileges, posing a hurdle to widespread exploitation, the risk remains for systems with compromised administrators or relaxed permissions. No active exploits have been reported, but similar vulnerabilities have led to malware attacks. The incident underscores the importance of vigilant software updating and highlights the ongoing security challenges for widely-used applications like WinRAR.
Source: https://cybersecuritynews.com/winrar-mark-of-the-web-bypass-vulnerability/
"id": "win830040325",
"linkid": "win.rar-gmbh",
"type": "Vulnerability",
"date": "4/2025",
"severity": "85",
"impact": "4",
"explanation": "Attack with significant impact with customers data leaks"