Google’s Threat Intelligence Group (GTIG) reports that CVE-2025-8088, a critical WinRAR vulnerability patched in July 2025, continues to be heavily exploited by nation-state actors and cybercriminals through January 2026. The flaw’s combination of trivial exploitation and WinRAR’s lack of automatic updates makes it an enduring threat.

Vulnerability overview

FieldValue
CVECVE-2025-8088
CVSS8.8 (High)
TypePath Traversal via Alternate Data Streams
Affected VersionsWinRAR 7.12 and earlier
Fixed VersionWinRAR 7.13 (July 30, 2025)
Related CVECVE-2025-6218 (similar flaw, disclosed June 19, 2025)
Zero-day exploitationConfirmed before public disclosure

Exploitation timeline

DateEvent
June 2025”zeroplayer” advertises WinRAR zero-day for $80,000 on criminal forum
June 19, 2025CVE-2025-6218 (similar path traversal) disclosed
July 30, 2025RARLAB releases WinRAR 7.13 with fixes for both CVEs
August 2025RomCom observed exploiting as zero-day before patch
October 2025APT44 campaigns targeting Ukrainian military
January 2026GTIG publishes comprehensive exploitation report
February 2026Multiple threat actor groups still actively exploiting

How it works

CVE-2025-8088 abuses Windows Alternate Data Streams (ADS), a feature that allows files to contain multiple data streams. Attackers craft malicious RAR archives that:

  1. Display a benign decoy file (typically a PDF) to the user
  2. Silently write malware to arbitrary locations via path traversal
  3. Target the Windows Startup folder for automatic persistence

Technical mechanism

PhaseAction
1Victim receives RAR archive with decoy document
2Archive contains hidden ADS entries with malicious payload
3Path traversal sequence escapes extraction directory
4Malicious LNK/HTA/BAT file dropped to Startup folder
5Windows executes malware on next login

Example path traversal:

../../../../../Users/<user>/AppData/Roaming/Microsoft/Windows/Start Menu/Programs/Startup/malicious.lnk

When the victim extracts and opens what appears to be a harmless document, the malware simultaneously drops into the Startup folder. The next time Windows boots, the malware executes automatically.

Why ADS is effective

FactorImpact
Hidden from ExplorerADS content not visible in standard file listings
Legitimate featureSecurity tools may not flag ADS usage
Decoy distractionUser focuses on visible document, not hidden payload
Silent persistenceNo visible installation or user prompt

Threat actors exploiting CVE-2025-8088

Russian-nexus APTs

ActorAlso Known AsTargetsPayloadStatus
APT44Sandworm, FROZENBARENTSUkrainian militaryLNK files downloading additional malwareActive into 2026
TurlaSnake, Waterbug, SUMMITUkrainian defense entitiesSTOCKSTAY malware suiteActive
TEMP.ArmageddonGamaredon, CARPATHIANUkrainian governmentHTA downloaders in Startup foldersOngoing into 2026
RomComEuropean organizationsNESTPACKER loaderZero-day exploitation pre-patch

APT44 drops decoy files with Ukrainian filenames alongside malicious LNK files that download additional payloads. Turla campaigns use lures related to Ukrainian military activities and drone deployments.

Chinese APT

An unnamed PRC-based group exploits CVE-2025-8088 to deliver PoisonIvy, a well-known Remote Access Trojan:

PhaseAction
1Victim opens malicious RAR archive
2BAT file dropped into Startup folder via ADS path traversal
3BAT file downloads malware dropper on next boot
4PoisonIvy RAT installed for persistent access

Cybercrime groups

Financially motivated actors are exploiting the vulnerability globally:

RegionTargetPayload
IndonesiaVarious sectorsCommodity RATs
Latin AmericaHospitality and travel organizationsXWorm, AsyncRAT
BrazilOnline banking usersBanking trojans
GlobalGeneral targetsVarious commodity malware

Exploit market activity

Before the vulnerability was publicly known, a criminal using the handle “zeroplayer” advertised a working WinRAR zero-day exploit for $80,000 on a cybercrime forum in June 2025.

Zeroplayer’s exploit offerings

ExploitPriceDate
WinRAR zero-day (CVE-2025-8088)$80,000June 2025
Microsoft Office RCE zero-day$300,000November 2025
Windows local privilege escalation zero-day$100,000Recent

The existence of a pre-patch market for this exploit confirms it was being used in targeted attacks before RARLAB released the fix. The continued availability of high-priced exploits from this seller indicates an established customer base.

Why exploitation persists

WinRAR lacks automatic updates. Users must manually download and install new versions. This creates a persistent population of vulnerable installations:

FactorImpact
No auto-update mechanismUsers must manually check and install
Application continues workingNo functional indicator of vulnerability
Enterprise deployment lagIT departments slow to push updates
User unawarenessMany don’t know updates exist
Seven months post-patchVast numbers remain exposed

Patch adoption challenge

TimeframeEstimated vulnerable population
Patch day (July 30, 2025)~100% of installations
3 months post-patchMajority still vulnerable
7 months post-patch (February 2026)Significant vulnerable population remains

Indicators of compromise

File-based indicators

IndicatorDescription
RAR files with ../ sequencesPath traversal in archive
ADS content in extracted filesHidden payload delivery
New files in Startup folderPersistence mechanism
LNK, HTA, BAT files after extractionCommon payload types

Behavioral indicators

IndicatorDetection method
Archive extraction followed by Startup folder writeFile system monitoring
Script execution from Startup folder after document openProcess monitoring
Outbound connections following archive extractionNetwork monitoring
New scheduled tasks or registry persistencePersistence monitoring

Mitigation

Immediate actions

PriorityAction
CriticalUpgrade WinRAR to 7.13 or later from rarlab.com
CriticalAlso addresses CVE-2025-6218 in same version
HighAudit systems for IOCs listed above
HighReview Startup folder contents across fleet

Defense in depth

ControlPurpose
Application allowlistingPrevent execution from Startup folder
Startup folder monitoringDetect new LNK, HTA, BAT, script files
ADS restrictions via Group PolicyReduce ADS abuse potential
EDR/XDRDetect path traversal and persistence patterns
Email attachment scanningBlock malicious RAR archives at gateway

Enterprise deployment considerations

ConsiderationRecommendation
Manual update burdenConsider automated deployment tools
Version trackingInventory WinRAR versions across organization
Alternative archiversEvaluate 7-Zip or native Windows extraction
Policy enforcementBlock execution of scripts from Startup folders

Detection guidance

Detection rulePurpose
RAR extraction with ADS writesCatch payload delivery
New executables in Startup folderDetect persistence
LNK file creation after Office/archive openIdentify attack chain
Path traversal sequences in archivesBlock before extraction

Recommendations

For security teams

PriorityAction
CriticalPush WinRAR 7.13+ to all managed systems
HighMonitor for Startup folder modifications
HighBlock ADS usage where not business-required
MediumConsider removing WinRAR in favor of built-in extraction
OngoingTrack threat intelligence on CVE-2025-8088 campaigns

For end users

PriorityAction
CriticalUpdate WinRAR to latest version manually
HighBe suspicious of unexpected archive attachments
HighAvoid opening archives from unknown senders
MediumConsider alternative archive tools with auto-update

Context

CVE-2025-8088 demonstrates how a single vulnerability in widely-deployed software becomes a shared resource for diverse threat actors. Nation-states use it for espionage, cybercriminals use it for financial theft, and both benefit from the patching gap created by manual update requirements.

The vulnerability chain—ADS abuse, path traversal, Startup folder persistence—is elegant in its simplicity and devastating in its effectiveness. Seven months after the patch, exploitation continues unabated.

Organizations should treat WinRAR updates with the same urgency as operating system patches—and consider whether WinRAR’s update model is acceptable for enterprise deployment. The lack of automatic updates in 2026 is a significant security liability.