Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14111: Path Traversal in Rarlab RAR App

0
Low
VulnerabilityCVE-2025-14111cvecve-2025-14111
Published: Fri Dec 05 2025 (12/05/2025, 22:32:05 UTC)
Source: CVE Database V5
Vendor/Project: Rarlab
Product: RAR App

Description

A security vulnerability has been detected in Rarlab RAR App up to 7.11 Build 127 on Android. This affects an unknown part of the component com.rarlab.rar. Such manipulation leads to path traversal. It is possible to launch the attack remotely. Attacks of this nature are highly complex. It is indicated that the exploitability is difficult. The exploit has been disclosed publicly and may be used. Upgrading to version 7.20 build 128 is able to mitigate this issue. You should upgrade the affected component. The vendor responded very professional: "This is the real vulnerability affecting RAR for Android only. WinRAR and Unix RAR versions are not affected. We already fixed it in RAR for Android 7.20 build 128 and we publicly mentioned it in that version changelog. (...) To avoid confusion among users, it would be useful if such disclosure emphasizes that it is RAR for Android only issue and WinRAR isn't affected."

AI-Powered Analysis

AILast updated: 12/12/2025, 23:36:47 UTC

Technical Analysis

CVE-2025-14111 is a path traversal vulnerability identified in the Rarlab RAR App for Android, specifically affecting versions up to 7.11 Build 127. The vulnerability resides in the component com.rarlab.rar, where improper validation of file paths during archive extraction allows an attacker to traverse directories and write files outside the intended extraction folder. This can lead to overwriting or creating files in arbitrary locations on the device's filesystem, potentially compromising data integrity or enabling further malicious actions. The attack vector is remote, but exploitation is complex, requiring user interaction (e.g., opening a crafted archive). The CVSS 4.0 vector indicates network attack vector (AV:N), high attack complexity (AC:H), no privileges required (PR:N), user interaction required (UI:P), and low impact on confidentiality, integrity, and availability (each rated low). The vendor has confirmed that this vulnerability affects only the Android version of the RAR app, not the Windows or Unix versions, and has released a fix in version 7.20 Build 128. No known exploits are currently observed in the wild, and the exploitability is considered difficult. The vulnerability's public disclosure emphasizes the need for users to upgrade to the patched version to mitigate risk.

Potential Impact

For European organizations, the impact of CVE-2025-14111 is generally low due to the complexity of exploitation and the limited scope of the vulnerability affecting only the Android RAR app. However, organizations that rely heavily on mobile devices for file archiving and extraction, especially those handling sensitive or critical data on Android platforms, could face risks of unauthorized file overwrites or data manipulation. This could lead to localized data integrity issues or facilitate further attacks if malicious files are placed in strategic locations. The vulnerability does not compromise confidentiality directly but can affect integrity and availability at a low level. Given the widespread use of Android devices in Europe, especially in sectors like finance, healthcare, and government, there is a potential for targeted attacks if threat actors craft malicious archives to exploit this flaw. The absence of known exploits in the wild and the availability of a patch reduce the overall risk, but delayed patching could increase exposure.

Mitigation Recommendations

European organizations should implement the following specific mitigation measures: 1) Immediately upgrade all instances of the Rarlab RAR App on Android devices to version 7.20 Build 128 or later to eliminate the vulnerability. 2) Enforce mobile device management (MDM) policies that restrict installation of outdated or unapproved app versions and enable centralized patch management. 3) Educate users about the risks of opening archive files from untrusted sources, emphasizing caution with unsolicited or suspicious archives. 4) Monitor network traffic and device logs for unusual file extraction activities or attempts to write files outside expected directories. 5) Employ endpoint protection solutions capable of detecting anomalous file system operations on mobile devices. 6) Where possible, limit the use of third-party archiving apps in favor of built-in or vetted alternatives with a strong security track record. 7) Conduct regular security audits of mobile applications and update policies to include rapid response to disclosed vulnerabilities. These steps go beyond generic advice by focusing on organizational controls, user awareness, and proactive patch enforcement tailored to the mobile environment.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-12-05T14:57:13.228Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6933607ff88dbe026c28528d

Added to database: 12/5/2025, 10:45:19 PM

Last enriched: 12/12/2025, 11:36:47 PM

Last updated: 1/20/2026, 6:29:16 PM

Views: 92

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats