Active Exploitation of 7-Zip CVE-2025-11001 ZIP Flaw Alert

Critical Remote Code Execution Vulnerability CVE-2025-11001 in 7-Zip Actively Exploited; Urgent Update to Version 25.00 Recommended

  • A critical vulnerability, CVE-2025-11001, affecting 7-Zip has been actively exploited since its public disclosure.
  • The flaw allows remote code execution via crafted ZIP files manipulating symbolic links, causing directory traversal.
  • 7-Zip version 25.00, released in July 2025, contains fixes for this and another similar vulnerability, CVE-2025-11002.
  • The vulnerability can only be exploited on Windows systems with elevated privileges or developer mode enabled.
  • A public proof-of-concept exploit is available, increasing urgency for users to update software promptly.

A recent security vulnerability in 7-Zip, identified as CVE-2025-11001, has been confirmed to be actively exploited in the wild, according to an advisory released by the United Kingdom‘s NHS England Digital on November 18, 2025. The issue allows remote attackers to execute arbitrary code by exploiting how the software handles symbolic links in ZIP archives, leading to directory traversal and unintended code execution. This flaw holds a CVSS severity score of 7.0.

- Advertisement -

The vulnerability was addressed in the July 2025 release of 7-Zip 25.00. This version also fixes a related security issue, CVE-2025-11002, which similarly permits remote code execution through improper handling of symbolic links introduced in version 21.02. Both vulnerabilities enable attackers to perform actions with the privileges of a service or elevated account.

According to Trend Micro’s Zero Day Initiative (ZDI), the exploit arises when specially crafted ZIP data causes the program to access files outside intended directories. The flaw could allow code execution within the context of a service account. The discovery and reporting of the vulnerability have been credited to Ryota Shiga of GMO Flatt Security Inc. and the company’s AI-based AppSec Auditor, Takumi.

Investigations confirm active exploitation of CVE-2025-11001, but details on the attackers, methods, or affected targets have yet to be disclosed. Security researcher Dominik, known as pacbypass, released a public proof-of-concept (PoC) exploit demonstrating the vulnerability. He noted in a detailed post that the exploit can only succeed on Windows systems when run by an elevated user, service account, or with developer mode enabled.

Users of 7-Zip are strongly advised to upgrade to version 25.00 as soon as possible to mitigate the risk. The PoC exploit is publicly accessible here. Additional technical details and the advisory on CVE-2025-11001 can be found on the ZDI website. The fix history for 7-Zip is available at the official change log.

- Advertisement -

✅ Follow BITNEWSBOT on Telegram, Facebook, LinkedIn, X.com, and Google News for instant updates.

Previous Articles:

- Advertisement -

Latest News

Gold Fears Return as Price Drops Below $5,000 Mark

Gold prices have dipped below $5,000, falling nearly 1% to around $4,985 per ounce...

CFTC to Back Crypto.com in Ninth Circuit Court

The CFTC will file a legal brief supporting crypto.com against state litigation, marking a...

Global Survey: 39% of Crypto Users Get Paid in Stablecoins

A YouGov survey finds 39% of crypto users receive income in stablecoins, while 27%...

Bank Slashes 70% Off XRP Forecast, Citing Market Weakness

Standard Chartered significantly lowered its price forecast for XRP, now predicting it will reach...

Bitcoin Long-Term Holders Capitulate as Support Weakens

Long-term Bitcoin holders accumulated less during February's price dip compared to events like the...

Must Read

8 Best Bitcoin Offshore Hosting Providers

In this blog post, we'll list the top 8 best bitcoin offshore hosting providers that accept Bitcoin and other cryptocurrencies.As Bitcoin continues to grow...
🔥 #AD Get 20% OFF any new 12 month hosting plan from Hostinger. Click here!