Hackers Exploit 7-Zip RCE Vulnerability (CVE-2025-11001) Using Symbolic Links

Published:

spot_img

7-Zip Security Flaw: What You Need to Know

Overview of the Vulnerability

A newly identified security vulnerability affecting 7-Zip has come to light, with reports indicating it is being actively exploited. The advisory, issued by NHS England Digital on November 19, 2025, outlines significant concerns regarding the software and its users.

Details of the Flaw

The vulnerability, designated as CVE-2025-11001, has a CVSS score of 7.0, indicating a substantial risk level. This flaw enables remote attackers to execute arbitrary code, posing serious threats to data security. The issue lies in how symbolic links are managed within ZIP files, particularly when crafted data is used. This manipulation can allow unauthorized access to unintended directories, facilitating attacks on systems where 7-Zip is installed.

Fixes and Updates

The good news is that this issue has been addressed in the latest 7-Zip update, version 25.00, released in July 2025. Users are urged to update to this version promptly to mitigate risks associated with the vulnerability. Alongside CVE-2025-11001, the update also rectifies another vulnerability, CVE-2025-11002, which has a similar risk profile and relates to improper handling of symbolic links within ZIP archives.

Discovery and Reporting

The flaws were reported by security expert Ryota Shiga of GMO Flatt Security Inc., utilizing the company’s AI-powered AppSec Auditor called Takumi. This proactive approach highlights the importance of continuous security scrutiny in software development and deployment.

Current Exploit Status

NHS England Digital has confirmed that the exploitation of CVE-2025-11001 is ongoing in the wild. However, the specifics regarding the actors behind the attacks or the context in which they are being conducted remain unclear. Given the existence of proof-of-concept (PoC) exploits, the urgency for users to apply updates is heightened.

User Impact and Recommendations

This vulnerability can only be exploited on systems with elevated user permissions or those operating in developer mode. Notably, it is restricted to Windows environments, making it a Windows-specific concern for 7-Zip users. Security researcher Dominik (also known as pacbypass) emphasized this in a recent post outlining the vulnerabilities.

For optimal protection, immediate action is recommended for users of 7-Zip. Updating to version 25.00 is essential to safeguard systems from potential attacks. Regularly checking for software updates and applying necessary patches can prevent many security risks associated with known vulnerabilities.

Conclusion

In summary, the recently disclosed vulnerabilities in 7-Zip underscore the critical nature of software security. Users must remain vigilant and prioritize the application of updates to ensure their data and systems are protected from active exploitation. Adopting best practices for software maintenance can significantly mitigate the potential impact of such vulnerabilities.

spot_img

Related articles

Recent articles

Fighting AI-Driven Cyberattacks with Preemptive Cyber Deception Strategies

Fighting AI-Driven Cyberattacks with Preemptive Cyber Deception Strategies Recent developments in artificial intelligence (AI) have underscored its role in facilitating advanced cyber espionage campaigns, as...

Afreximbank Launches Season II of ‘Impact Stories,’ Highlighting Transformative Projects Across Africa and the Caribbean

Afreximbank Launches Season II of ‘Impact Stories,’ Highlighting Transformative Projects Across Africa and the Caribbean The African Export-Import Bank (Afreximbank) has announced the launch of...

Cohesity Advances Cyber Resilience with Enhanced Data Protection and AI Security Solutions

Cohesity Advances Cyber Resilience with Enhanced Data Protection and AI Security Solutions Cohesity has unveiled significant enhancements to its data protection and security portfolio, aimed...

CISOs Must Strengthen Phishing Detection: 3 Essential Steps for Scaling SOC Effectiveness

CISOs Must Strengthen Phishing Detection: 3 Essential Steps for Scaling SOC Effectiveness Phishing has evolved into one of the most challenging threats for enterprises to...