Mark-of-the-Web Bypass Vulnerability in Bandisoft Bandizip
CVE-2025-33027

7.8HIGH

Key Information:

Vendor

Bandisoft

Status
Vendor
CVE Published:
15 April 2025

What is CVE-2025-33027?

The Bandisoft Bandizip application, up to version 7.37, is prone to a vulnerability that allows attackers to bypass the Mark-of-the-Web protections. This flaw arises during the handling of archived files, where the Mark-of-the-Web attribute is not preserved upon extraction. As a result, if a user downloads a malicious archive and extracts its contents, extracted files may not retain their protective attributes. This can lead to the execution of arbitrary code within the context of the current user, posing significant security risks. User interaction is required, such as visiting a malicious website or opening a harmful file, making awareness and cautious behavior essential for defense.

Affected Version(s)

Bandizip 0 <= 7.37

References

CVSS V3.1

Score:
7.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.
CVE-2025-33027 : Mark-of-the-Web Bypass Vulnerability in Bandisoft Bandizip