Filename Spoofing Vulnerability in WinRAR by RARLab
CVE-2014-125119

8.4HIGH

Key Information:

Vendor

Rarlab

Status
Vendor
CVE Published:
25 July 2025

Badges

👾 Exploit Exists🟡 Public PoC

What is CVE-2014-125119?

A filename spoofing vulnerability exists in WinRAR, where inconsistencies between the Central Directory and Local File Header in ZIP archives can be exploited. When users open specially crafted ZIP files, the file names displayed can differ from the actual files being extracted. This discrepancy allows attackers to masquerade malicious files as harmless ones, significantly increasing the risk of remote code execution when users unwittingly run the spoofed files.

Affected Version(s)

WinRAR 3.80 < 3.91

WinRAR 4.11 < 5.00

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

References

CVSS V4

Score:
8.4
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
Unknown

Timeline

  • 🟡

    Public PoC available

  • 👾

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

Credit

chr1x
.