Mark-of-the-Web Bypass Vulnerability in Bandisoft Bandizip
CVE-2025-33027

6.1MEDIUM

Key Information:

Vendor

Bandisoft

Status
Vendor
CVE Published:
15 April 2025

What is CVE-2025-33027?

The Bandisoft Bandizip application, up to version 7.37, is prone to a vulnerability that allows attackers to bypass the Mark-of-the-Web protections. This flaw arises during the handling of archived files, where the Mark-of-the-Web attribute is not preserved upon extraction. As a result, if a user downloads a malicious archive and extracts its contents, extracted files may not retain their protective attributes. This can lead to the execution of arbitrary code within the context of the current user, posing significant security risks. User interaction is required, such as visiting a malicious website or opening a harmful file, making awareness and cautious behavior essential for defense.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.

Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.

Affected Version(s)

Bandizip 0 <= 7.37

References

CVSS V3.1

Score:
6.1
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
Low
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Changed

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.