File-compression utility WinRAR has issued version 7.13 to close CVE-2025-8088, a high-severity zero-day vulnerability that security firm ESET says has been under active exploitation since mid-July by at least two Russia-linked hacking groups, RomCom and the outfit tracked as Paper Werewolf. The flaw allows a specially crafted RAR archive to bypass normal extraction paths and drop executables into Windows start-up directories, creating a persistent backdoor when a victim opens what appears to be a benign file. ESET reports the attackers delivered the booby-trapped archives through phishing emails masquerading as job-application documents aimed at financial, manufacturing, defence and logistics firms in Europe and Canada. WinRAR quietly shipped the fix on 30 July after receiving ESETâs report on 18 July, but earlier versionsâ7.12 and belowâremain vulnerable and the program lacks an automatic update mechanism. Security researchers are urging the utilityâs hundreds of millions of users to download version 7.13 immediately to mitigate the risk of compromise.
A WinRAR zero-day vulnerability was exploited in the wild by the Russia-linked RomCom threat group, @ESET reported. #cybersecurity #infosec #ITsecurity https://t.co/Rl9UsWGMbN
Microsoftâs Patch Tuesday: 100+ Updates Including Azure OpenAI Service, Memory Corruption Flaw https://t.co/L6pdpzedBT #technology #technews https://t.co/a8tf9rvfCr
Patch Now: Attackers Target OT Networks via Critical RCE Flaw: https://t.co/k6E5r2uQah by darkreading #infosec #cybersecurity #technology #news