BTC $71,807
2026 Bull Run Is Building Start trading with 5% OFF all fees
Sign Up Now
BTC $71,807
Bull Run 2026 | 5% Off Fees Open your Binance account today
Sign Up

WinRAR Path Traversal Bug CVE-2025-6218 Exploited Actively

Critical WinRAR Vulnerability CVE-2025-6218 Exploited by Advanced Threat Actors in Targeted Phishing Campaigns

  • A path traversal vulnerability in the Windows version of WinRAR (CVE-2025-6218) enables code execution and has active exploitation.
  • The flaw allows attackers to place files in sensitive locations, such as the Windows Startup folder, causing code to run on user login.
  • Several advanced threat actors, including GOFFEE, Bitter (APT-C-08), and Gamaredon, have exploited this vulnerability in targeted phishing campaigns.
  • Bitter uses the vulnerability to drop a C# trojan via a malicious RAR archive with a macro-enabled Word document, enabling persistence and data theft.
  • Federal Civilian Executive Branch agencies must apply patches by December 30, 2025, following the advisory from the U.S. Cybersecurity and Infrastructure Security Agency.

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added a critical vulnerability affecting the Windows version of the WinRAR file compression tool to its Known Exploited Vulnerabilities catalog on December 9, 2025. The flaw, tracked as CVE-2025-6218 with a CVSS score of 7.8, is a path traversal vulnerability that could allow code execution if a user opens a malicious file or visits a crafted webpage.

- Advertisement -
Ad
Altseason Is Loading. Don't watch from the sidelines.
SOL $90.51
DOGE $0.0963
LINK $9.02
SUI $1.00
5% off fees when you sign up
Start Trading

The vulnerability permits attackers to place files in sensitive locations, such as the Windows Startup folder, potentially triggering code execution upon system login. RARLAB patched this issue in WinRAR 7.12 released in June 2025. Other platform versions, including Unix and Android, are unaffected.

Multiple cybersecurity firms report that threat actors have exploited this vulnerability in attacks. The adversaries include GOFFEE (aka Paper Werewolf), Bitter (also known as APT-C-08 or Manlinghua), and Gamaredon. GOFFEE reportedly combined CVE-2025-6218 with another WinRAR path traversal flaw (CVE-2025-8088) in phishing campaigns targeting organizations in Russia in mid-2025.

The South Asia–focused Bitter APT group weaponized the vulnerability by delivering a malicious RAR archive named “Provision of Information for Sectoral for AJK.rar.” This archive contains a benign Word document alongside a malicious macro template that drops a file named Normal.dotm into the global template path of Microsoft Word. According to Foresiet, “Normal.dotm is a global template that loads every time Word is opened. By replacing the legitimate file, the attacker ensures their malicious macro code executes automatically, providing a persistent backdoor that bypasses standard email macro blocking.” The dropped C# trojan communicates with the server johnfashionaccess[.]com for command and control, enabling keylogging, screenshot capture, remote desktop protocol credential theft, and data exfiltration.

Additionally, the Russian group Gamaredon utilized CVE-2025-6218 in phishing campaigns targeting Ukrainian military and government institutions. They deployed a Malware called Pteranodon, with operations first observed in November 2025. A security researcher named Robin described the campaign as “a structured, military-oriented espionage and sabotage operation consistent with, and likely coordinated by, Russian state intelligence.” Gamaredon has also extensively exploited CVE-2025-8088 for delivering Visual Basic Script malware and a destructive wiper known as GamaWiper, marking a shift from espionage to destructive actions.

- Advertisement -

Federal Civilian Executive Branch agencies are required to implement patches for this vulnerability by December 30, 2025, to protect their systems. Detailed information about the vulnerability and advisories can be found at the CVE-2025-6218 entry and the CISA Known Exploited Vulnerabilities catalog.

✅ Follow BITNEWSBOT on Telegram, Facebook, LinkedIn, X.com, and Google News for instant updates.

Previous Articles:

- Advertisement -
Ad
Pay Less on Every Trade. For Life.
$10K/mo volume Save $60/yr
$50K/mo volume Save $300/yr
$100K/mo volume Save $600/yr
5% off all trading fees when you sign up
Claim Your Discount

Latest News

Pump.fun Restricts Creator Fee Changes To One

Pump.fun has limited memecoin creators to just one post-launch change to fee recipient wallets.The...

Cardano Rebounds, But $0.50 in Sight for 2026?

Cardano (ADA) has gained 3% in the last 24 hours but remains down 7.7%...

$35M in Bitcoin seized after police crack lost wallet

Irish police, with Europol's help, have seized 500 Bitcoin (worth over $35 million) from...

Gold Crashes to 4-Month Low; Strategists Keep $5K–$6.3K Targets

Gold crashed to a four-month low of $4,098, posting its worst five-session performance since...

Baltimore sues xAI over Grok’s millions of non-consensual deepfakes

The Mayor and City Council of Baltimore have sued X Corp., xAI, and SpaceX,...

Must Read

How to Buy VPS with Crypto from Hostinger – Step by Step guide

Did you know that nowadays you can use Bitcoin to purchase a Windows VPS? If you’re here, you’re probably wondering how to do it....
Ad
Altseason Is Loading. These 4 coins are trending right now.
SOL $92.12
DOGE $0.0950
LINK $9.02
SUI $1.02
5% off spot fees when you sign up
Start Trading