Hackers Exploit 7-Zip RCE Vulnerability (CVE-2025-11001) Using Symbolic Links

Published:

spot_img

7-Zip Security Flaw: What You Need to Know

Overview of the Vulnerability

A newly identified security vulnerability affecting 7-Zip has come to light, with reports indicating it is being actively exploited. The advisory, issued by NHS England Digital on November 19, 2025, outlines significant concerns regarding the software and its users.

Details of the Flaw

The vulnerability, designated as CVE-2025-11001, has a CVSS score of 7.0, indicating a substantial risk level. This flaw enables remote attackers to execute arbitrary code, posing serious threats to data security. The issue lies in how symbolic links are managed within ZIP files, particularly when crafted data is used. This manipulation can allow unauthorized access to unintended directories, facilitating attacks on systems where 7-Zip is installed.

Fixes and Updates

The good news is that this issue has been addressed in the latest 7-Zip update, version 25.00, released in July 2025. Users are urged to update to this version promptly to mitigate risks associated with the vulnerability. Alongside CVE-2025-11001, the update also rectifies another vulnerability, CVE-2025-11002, which has a similar risk profile and relates to improper handling of symbolic links within ZIP archives.

Discovery and Reporting

The flaws were reported by security expert Ryota Shiga of GMO Flatt Security Inc., utilizing the company’s AI-powered AppSec Auditor called Takumi. This proactive approach highlights the importance of continuous security scrutiny in software development and deployment.

Current Exploit Status

NHS England Digital has confirmed that the exploitation of CVE-2025-11001 is ongoing in the wild. However, the specifics regarding the actors behind the attacks or the context in which they are being conducted remain unclear. Given the existence of proof-of-concept (PoC) exploits, the urgency for users to apply updates is heightened.

User Impact and Recommendations

This vulnerability can only be exploited on systems with elevated user permissions or those operating in developer mode. Notably, it is restricted to Windows environments, making it a Windows-specific concern for 7-Zip users. Security researcher Dominik (also known as pacbypass) emphasized this in a recent post outlining the vulnerabilities.

For optimal protection, immediate action is recommended for users of 7-Zip. Updating to version 25.00 is essential to safeguard systems from potential attacks. Regularly checking for software updates and applying necessary patches can prevent many security risks associated with known vulnerabilities.

Conclusion

In summary, the recently disclosed vulnerabilities in 7-Zip underscore the critical nature of software security. Users must remain vigilant and prioritize the application of updates to ensure their data and systems are protected from active exploitation. Adopting best practices for software maintenance can significantly mitigate the potential impact of such vulnerabilities.

spot_img

Related articles

Recent articles

UAE Unveils $10 Billion Investment Fund to Target $600 Billion FDI by 2031

## UAE Approves $10 Billion National Investment Fund During a recent Cabinet meeting chaired by Sheikh Mohammed bin Rashid Al Maktoum at the Dubai Airshow,...

MI5 Warns of Chinese Spy Threat Targeting UK Parliament via LinkedIn

MI5 Warns about Chinese Recruitment Operations through LinkedIn Background of the Espionage Alert Recently, MI5, the UK’s domestic intelligence agency, raised alarms regarding an espionage operation...

50,000 Indian CCTVs Hacked: Hospital Footage Sold Online

Disturbing CCTV Hacking Case Unveils Widespread Cybercrime in India Introduction A troubling case in Gujarat, India, has come to light involving the illegal hacking of CCTV...

Uncovering the True Cost of Vulnerability Backlogs and How to Tackle Them

Navigating the Vulnerability Backlog in Digital Transformation As organizations embark on rapid digital transformation, they face an increasing number of applications, services, and platforms. While...