{"dataType": "CVE_RECORD", "containers": {"cna": {"metrics": [{"format": "CVSS", "cvssV3_1": {"scope": "UNCHANGED", "version": "3.1", "baseScore": 8.8, "attackVector": "NETWORK", "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "integrityImpact": "HIGH", "userInteraction": "REQUIRED", "attackComplexity": "LOW", "availabilityImpact": "HIGH", "privilegesRequired": "NONE", "confidentialityImpact": "HIGH"}}], "affected": [{"cpes": ["cpe:2.3:a:dtsearch:dtsearch:*:*:*:*:*:*:*:*"], "vendor": "dtsearch", "product": "dtsearch", "versions": [{"status": "affected", "version": "0", "lessThan": "2023.01", "versionType": "custom"}], "platforms": ["cpe:2.3:o:microsoft:*:*:*:*:*:*:*:*:*"], "defaultStatus": "unaffected"}, {"cpes": ["cpe:2.3:a:rarlab:winrar:*:*:*:*:*:*:*:*"], "vendor": "rarlab", "product": "winrar", "versions": [{"status": "affected", "version": "0", "lessThan": "7.13", "versionType": "custom"}], "platforms": ["cpe:2.3:o:microsoft:*:*:*:*:*:*:*:*:*"], "defaultStatus": "unaffected"}], "references": [{"url": "https://www.vicarius.io/vsociety/posts/cve-2025-8088-mitigate-winrar-zero-day-using-srp-and-ifeo", "tags": ["mitigation", "third-party-advisory"]}, {"url": "https://www.win-rar.com/singlenewsview.html?&L=0&tx_ttnews%5Btt_news%5D=283&cHash=a64b4a8f662d3639dec8d65f47bc93c5", "tags": ["release-notes"]}, {"url": "https://support.dtsearch.com/faq/dts0245.htm", "tags": ["third-party-advisory"]}, {"url": "https://www.vicarius.io/vsociety/posts/cve-2025-8088-detect-winrar-zero-day", "tags": ["third-party-advisory"]}, {"url": "https://arstechnica.com/security/2025/08/high-severity-winrar-0-day-exploited-for-weeks-by-2-groups/", "tags": ["x_press/media-coverage"]}, {"url": "https://www.welivesecurity.com/en/eset-research/update-winrar-tools-now-romcom-and-others-exploiting-zero-day-vulnerability/#the-discovery-of-cve-2025-8088", "tags": ["x_press/media-coverage"]}, {"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-8088", "tags": ["x_us-government-resource"]}], "descriptions": [{"lang": "en", "value": "A path traversal vulnerability affecting the Windows version of WinRAR allows the attackers to execute arbitrary code by crafting malicious archive files. This vulnerability was exploited in the wild and was discovered by Anton Cherepanov, Peter Košinár, and Peter Strýček\n     from ESET."}, {"lang": "es", "value": "Una vulnerabilidad de path traversal que afecta a la versión de WinRAR para Windows permite a los atacantes ejecutar código arbitrario mediante la manipulación de archivos maliciosos. Esta vulnerabilidad fue explotada indiscriminadamente y descubierta por Anton Cherepanov, Peter Košinár y Peter Strý?ek de ESET."}], "problemTypes": [{"descriptions": [{"lang": "en", "cweId": "CWE-35", "description": "CWE-35"}]}], "providerMetadata": {"orgId": "00000000-0000-4000-A000-000000000003", "shortName": "nvd", "dateUpdated": "2025-08-08T12:15:29Z", "x_subShortName": "nvd"}}}, "cveMetadata": {"cveId": "CVE-2025-8088", "state": "PUBLISHED", "dateUpdated": "2025-10-30T15:50:59Z", "assignerOrgId": "4a9b9929-2450-4021-b7b9-469a0255b215", "datePublished": "2025-08-08T12:15:29Z", "assignerShortName": "ESET"}, "dataVersion": "5.0"}