Active Exploitation of 7-Zip CVE-2025-11001 ZIP Flaw Alert

Critical Remote Code Execution Vulnerability CVE-2025-11001 in 7-Zip Actively Exploited; Urgent Update to Version 25.00 Recommended

  • A critical vulnerability, CVE-2025-11001, affecting 7-Zip has been actively exploited since its public disclosure.
  • The flaw allows remote code execution via crafted ZIP files manipulating symbolic links, causing directory traversal.
  • 7-Zip version 25.00, released in July 2025, contains fixes for this and another similar vulnerability, CVE-2025-11002.
  • The vulnerability can only be exploited on Windows systems with elevated privileges or developer mode enabled.
  • A public proof-of-concept exploit is available, increasing urgency for users to update software promptly.

A recent security vulnerability in 7-Zip, identified as CVE-2025-11001, has been confirmed to be actively exploited in the wild, according to an advisory released by the United Kingdom‘s NHS England Digital on November 18, 2025. The issue allows remote attackers to execute arbitrary code by exploiting how the software handles symbolic links in ZIP archives, leading to directory traversal and unintended code execution. This flaw holds a CVSS severity score of 7.0.

- Advertisement -

The vulnerability was addressed in the July 2025 release of 7-Zip 25.00. This version also fixes a related security issue, CVE-2025-11002, which similarly permits remote code execution through improper handling of symbolic links introduced in version 21.02. Both vulnerabilities enable attackers to perform actions with the privileges of a service or elevated account.

According to Trend Micro’s Zero Day Initiative (ZDI), the exploit arises when specially crafted ZIP data causes the program to access files outside intended directories. The flaw could allow code execution within the context of a service account. The discovery and reporting of the vulnerability have been credited to Ryota Shiga of GMO Flatt Security Inc. and the company’s AI-based AppSec Auditor, Takumi.

Investigations confirm active exploitation of CVE-2025-11001, but details on the attackers, methods, or affected targets have yet to be disclosed. Security researcher Dominik, known as pacbypass, released a public proof-of-concept (PoC) exploit demonstrating the vulnerability. He noted in a detailed post that the exploit can only succeed on Windows systems when run by an elevated user, service account, or with developer mode enabled.

Users of 7-Zip are strongly advised to upgrade to version 25.00 as soon as possible to mitigate the risk. The PoC exploit is publicly accessible here. Additional technical details and the advisory on CVE-2025-11001 can be found on the ZDI website. The fix history for 7-Zip is available at the official change log.

- Advertisement -

✅ Follow BITNEWSBOT on Telegram, Facebook, LinkedIn, X.com, and Google News for instant updates.

Previous Articles:

- Advertisement -

Latest News

Winklevoss Twins Shift $130M Bitcoin to Gemini Wallets

Gemini founders Tyler and Cameron Winklevoss transferred approximately $130 million in Bitcoin to the...

Bitcoin ETF inflows return while altcoin funds see outflows

US spot Bitcoin ETFs snapped a two-day outflow streak with a net inflow of...

Salesforce Warns of API Attacks Exploiting Cloud Misconfigs

Threat actors are actively exploiting misconfigured Salesforce Experience Cloud sites to steal sensitive data.The...

Oil Prices Swing Sharply Amid Trump-Iran Strait Threats

Volatile oil prices surged past $100, crashed to $84, then rebounded to $91 over...

Banking Groups Mull Lawsuit Over Crypto Bank Charters

The Bank Policy Institute, representing major Wall Street banks, is considering a lawsuit against...

Must Read

8 Best Crypto Debit Cards For Spending Your Digital Tokens

What are | How we chose | Best crypto debit cards | Binance Card? | FAQ | Final WordsCrypto debit cards have transformed how...