Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2023-38831: n/a

0
High
VulnerabilityCVE-2023-38831cvecve-2023-38831
Published: Wed Aug 23 2023 (08/23/2023, 00:00:00 UTC)
Source: CVE Database V5

Description

RARLAB WinRAR before 6.23 allows attackers to execute arbitrary code when a user attempts to view a benign file within a ZIP archive. The issue occurs because a ZIP archive may include a benign file (such as an ordinary .JPG file) and also a folder that has the same name as the benign file, and the contents of the folder (which may include executable content) are processed during an attempt to access only the benign file. This was exploited in the wild in April through October 2023.

AI-Powered Analysis

AILast updated: 10/21/2025, 20:33:27 UTC

Technical Analysis

CVE-2023-38831 is a critical vulnerability affecting WinRAR versions prior to 6.23. The vulnerability exploits the way WinRAR processes ZIP archives containing a benign file (e.g., a .JPG) alongside a folder named identically to that file. When a user attempts to view the benign file, WinRAR inadvertently processes the folder's contents, which may include malicious executable code. This flaw enables attackers to execute arbitrary code on the victim's system without requiring privileges or authentication, but user interaction is necessary to trigger the exploit by opening the crafted archive. The vulnerability is classified under CWE-351 (Insufficient Verification of Data Authenticity) and has a CVSS v3.1 base score of 7.8, indicating high severity with impacts on confidentiality, integrity, and availability. The attack vector is local (AV:L), but the vulnerability is easy to exploit (AC:L) and requires user interaction (UI:R). This vulnerability was exploited in the wild from April to October 2023, demonstrating active threat actor interest. The lack of patch links in the provided data suggests organizations must verify and apply the official WinRAR update to version 6.23 or later to remediate the issue. The vulnerability poses a significant risk to environments where users frequently open ZIP archives from untrusted or external sources, potentially leading to system compromise, data theft, or ransomware deployment.

Potential Impact

For European organizations, this vulnerability presents a substantial risk due to the widespread use of WinRAR for handling compressed files. Successful exploitation can lead to arbitrary code execution, enabling attackers to install malware, steal sensitive data, or disrupt operations. Sectors with high reliance on file exchange, such as finance, manufacturing, and government, are particularly vulnerable. The vulnerability's exploitation requires user interaction, which means phishing or social engineering campaigns could be used to deliver malicious archives. Given the active exploitation period in 2023, organizations that have not updated WinRAR remain exposed. The impact extends to confidentiality breaches, integrity violations through unauthorized code execution, and availability disruptions if malware like ransomware is deployed. European data protection regulations (e.g., GDPR) increase the compliance risk associated with such breaches, potentially leading to legal and financial consequences.

Mitigation Recommendations

1. Immediately update all WinRAR installations to version 6.23 or later, which addresses this vulnerability. 2. Implement strict policies to restrict opening ZIP archives from untrusted or unknown sources, especially those received via email or downloaded from the internet. 3. Deploy endpoint security solutions capable of detecting and blocking malicious archive contents and suspicious execution behaviors. 4. Educate users about the risks of opening compressed files from unverified senders and train them to recognize phishing attempts. 5. Utilize application whitelisting to prevent unauthorized executables from running, particularly those extracted from archives. 6. Monitor network and endpoint logs for unusual activity related to archive processing or unexpected code execution. 7. Consider sandboxing or isolating file extraction processes to limit potential damage from malicious archives. 8. Regularly audit and inventory software versions across the organization to ensure timely patching of vulnerabilities.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2023-07-25T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68f7d9ac247d717aace22110

Added to database: 10/21/2025, 7:06:20 PM

Last enriched: 10/21/2025, 8:33:27 PM

Last updated: 10/30/2025, 3:30:13 AM

Views: 13

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats