CVE-2025-14111: Path Traversal in Rarlab RAR App
A security vulnerability has been detected in Rarlab RAR App up to 7.11 Build 127 on Android. This affects an unknown part of the component com.rarlab.rar. Such manipulation leads to path traversal. It is possible to launch the attack remotely. Attacks of this nature are highly complex. It is indicated that the exploitability is difficult. The exploit has been disclosed publicly and may be used. Upgrading to version 7.20 build 128 is able to mitigate this issue. You should upgrade the affected component. The vendor responded very professional: "This is the real vulnerability affecting RAR for Android only. WinRAR and Unix RAR versions are not affected. We already fixed it in RAR for Android 7.20 build 128 and we publicly mentioned it in that version changelog. (...) To avoid confusion among users, it would be useful if such disclosure emphasizes that it is RAR for Android only issue and WinRAR isn't affected."
AI Analysis
Technical Summary
CVE-2025-14111 is a path traversal vulnerability identified in the Rarlab RAR App for Android, specifically affecting versions up to 7.11 Build 127. The vulnerability resides in the component com.rarlab.rar, where improper validation of file paths during archive extraction allows an attacker to traverse directories and write files outside the intended extraction folder. This can lead to overwriting or creating files in arbitrary locations on the device's filesystem, potentially compromising data integrity or enabling further malicious actions. The attack vector is remote, but exploitation is complex, requiring user interaction (e.g., opening a crafted archive). The CVSS 4.0 vector indicates network attack vector (AV:N), high attack complexity (AC:H), no privileges required (PR:N), user interaction required (UI:P), and low impact on confidentiality, integrity, and availability (each rated low). The vendor has confirmed that this vulnerability affects only the Android version of the RAR app, not the Windows or Unix versions, and has released a fix in version 7.20 Build 128. No known exploits are currently observed in the wild, and the exploitability is considered difficult. The vulnerability's public disclosure emphasizes the need for users to upgrade to the patched version to mitigate risk.
Potential Impact
For European organizations, the impact of CVE-2025-14111 is generally low due to the complexity of exploitation and the limited scope of the vulnerability affecting only the Android RAR app. However, organizations that rely heavily on mobile devices for file archiving and extraction, especially those handling sensitive or critical data on Android platforms, could face risks of unauthorized file overwrites or data manipulation. This could lead to localized data integrity issues or facilitate further attacks if malicious files are placed in strategic locations. The vulnerability does not compromise confidentiality directly but can affect integrity and availability at a low level. Given the widespread use of Android devices in Europe, especially in sectors like finance, healthcare, and government, there is a potential for targeted attacks if threat actors craft malicious archives to exploit this flaw. The absence of known exploits in the wild and the availability of a patch reduce the overall risk, but delayed patching could increase exposure.
Mitigation Recommendations
European organizations should implement the following specific mitigation measures: 1) Immediately upgrade all instances of the Rarlab RAR App on Android devices to version 7.20 Build 128 or later to eliminate the vulnerability. 2) Enforce mobile device management (MDM) policies that restrict installation of outdated or unapproved app versions and enable centralized patch management. 3) Educate users about the risks of opening archive files from untrusted sources, emphasizing caution with unsolicited or suspicious archives. 4) Monitor network traffic and device logs for unusual file extraction activities or attempts to write files outside expected directories. 5) Employ endpoint protection solutions capable of detecting anomalous file system operations on mobile devices. 6) Where possible, limit the use of third-party archiving apps in favor of built-in or vetted alternatives with a strong security track record. 7) Conduct regular security audits of mobile applications and update policies to include rapid response to disclosed vulnerabilities. These steps go beyond generic advice by focusing on organizational controls, user awareness, and proactive patch enforcement tailored to the mobile environment.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Sweden
CVE-2025-14111: Path Traversal in Rarlab RAR App
Description
A security vulnerability has been detected in Rarlab RAR App up to 7.11 Build 127 on Android. This affects an unknown part of the component com.rarlab.rar. Such manipulation leads to path traversal. It is possible to launch the attack remotely. Attacks of this nature are highly complex. It is indicated that the exploitability is difficult. The exploit has been disclosed publicly and may be used. Upgrading to version 7.20 build 128 is able to mitigate this issue. You should upgrade the affected component. The vendor responded very professional: "This is the real vulnerability affecting RAR for Android only. WinRAR and Unix RAR versions are not affected. We already fixed it in RAR for Android 7.20 build 128 and we publicly mentioned it in that version changelog. (...) To avoid confusion among users, it would be useful if such disclosure emphasizes that it is RAR for Android only issue and WinRAR isn't affected."
AI-Powered Analysis
Technical Analysis
CVE-2025-14111 is a path traversal vulnerability identified in the Rarlab RAR App for Android, specifically affecting versions up to 7.11 Build 127. The vulnerability resides in the component com.rarlab.rar, where improper validation of file paths during archive extraction allows an attacker to traverse directories and write files outside the intended extraction folder. This can lead to overwriting or creating files in arbitrary locations on the device's filesystem, potentially compromising data integrity or enabling further malicious actions. The attack vector is remote, but exploitation is complex, requiring user interaction (e.g., opening a crafted archive). The CVSS 4.0 vector indicates network attack vector (AV:N), high attack complexity (AC:H), no privileges required (PR:N), user interaction required (UI:P), and low impact on confidentiality, integrity, and availability (each rated low). The vendor has confirmed that this vulnerability affects only the Android version of the RAR app, not the Windows or Unix versions, and has released a fix in version 7.20 Build 128. No known exploits are currently observed in the wild, and the exploitability is considered difficult. The vulnerability's public disclosure emphasizes the need for users to upgrade to the patched version to mitigate risk.
Potential Impact
For European organizations, the impact of CVE-2025-14111 is generally low due to the complexity of exploitation and the limited scope of the vulnerability affecting only the Android RAR app. However, organizations that rely heavily on mobile devices for file archiving and extraction, especially those handling sensitive or critical data on Android platforms, could face risks of unauthorized file overwrites or data manipulation. This could lead to localized data integrity issues or facilitate further attacks if malicious files are placed in strategic locations. The vulnerability does not compromise confidentiality directly but can affect integrity and availability at a low level. Given the widespread use of Android devices in Europe, especially in sectors like finance, healthcare, and government, there is a potential for targeted attacks if threat actors craft malicious archives to exploit this flaw. The absence of known exploits in the wild and the availability of a patch reduce the overall risk, but delayed patching could increase exposure.
Mitigation Recommendations
European organizations should implement the following specific mitigation measures: 1) Immediately upgrade all instances of the Rarlab RAR App on Android devices to version 7.20 Build 128 or later to eliminate the vulnerability. 2) Enforce mobile device management (MDM) policies that restrict installation of outdated or unapproved app versions and enable centralized patch management. 3) Educate users about the risks of opening archive files from untrusted sources, emphasizing caution with unsolicited or suspicious archives. 4) Monitor network traffic and device logs for unusual file extraction activities or attempts to write files outside expected directories. 5) Employ endpoint protection solutions capable of detecting anomalous file system operations on mobile devices. 6) Where possible, limit the use of third-party archiving apps in favor of built-in or vetted alternatives with a strong security track record. 7) Conduct regular security audits of mobile applications and update policies to include rapid response to disclosed vulnerabilities. These steps go beyond generic advice by focusing on organizational controls, user awareness, and proactive patch enforcement tailored to the mobile environment.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-12-05T14:57:13.228Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 6933607ff88dbe026c28528d
Added to database: 12/5/2025, 10:45:19 PM
Last enriched: 12/12/2025, 11:36:47 PM
Last updated: 1/20/2026, 6:29:16 PM
Views: 92
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-67263: n/a
HighCVE-2025-33231: CWE-427 Uncontrolled Search Path Element in NVIDIA CUDA Toolkit
MediumCVE-2025-33230: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in NVIDIA CUDA Toolkit
HighCVE-2025-67261: n/a
HighCVE-2025-55423: n/a
CriticalActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.