CVE-2025-33027: CWE-830 Inclusion of Web Functionality from an Untrusted Source in Bandisoft Bandizip
In Bandisoft Bandizip through 7.37, there is a Mark-of-the-Web Bypass Vulnerability. This vulnerability allows attackers to bypass the Mark-of-the-Web protection mechanism on affected installations of Bandizip. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of archived files. When extracting files from a crafted archive that bears the Mark-of-the-Web, Bandizip does not propagate the Mark-of-the-Web to the extracted files. An attacker can leverage this vulnerability to execute arbitrary code in the context of the current user. NOTE: this is disputed because Mark-of-the-Web propagation can increase risk via security-warning habituation, and because the intended control sphere for file-origin metadata (e.g., HostUrl in Zone.Identifier) may be narrower than that for reading the file's content.
AI Analysis
Technical Summary
CVE-2025-33027 is a vulnerability identified in Bandisoft Bandizip versions through 7.37, related to the improper handling of the Mark-of-the-Web (MotW) security feature. MotW is a Windows security mechanism that tags files downloaded from the internet or other untrusted sources to warn users and restrict certain actions. Bandizip fails to propagate the MotW attribute from archived files to the extracted files. This flaw allows attackers to craft malicious archives that, when extracted, produce files without the MotW tag, effectively bypassing Windows security warnings and restrictions. The vulnerability is classified under CWE-830, which involves the inclusion of web functionality from untrusted sources, potentially enabling execution of malicious web content or scripts. Exploitation requires user interaction, such as opening a malicious archive or visiting a malicious webpage that triggers archive extraction. Successful exploitation can lead to arbitrary code execution in the context of the current user, potentially compromising confidentiality and integrity of user data. The CVSS v3.1 base score is 6.1 (medium), reflecting network attack vector, low attack complexity, no privileges required, but user interaction needed, with partial confidentiality and integrity impact and no availability impact. No public exploits are currently known, and the vulnerability is disputed regarding the security implications of MotW propagation. However, the risk remains significant for users who extract files from untrusted sources using Bandizip.
Potential Impact
For European organizations, this vulnerability poses a moderate risk primarily to end-user systems where Bandizip is used to extract files from untrusted or external sources. Successful exploitation can lead to arbitrary code execution with the privileges of the current user, potentially enabling attackers to install malware, steal sensitive information, or move laterally within a network. The bypass of MotW reduces the effectiveness of Windows security warnings, increasing the likelihood of users executing malicious files unknowingly. Sectors with high reliance on compressed archives, such as finance, government, and critical infrastructure, may face increased exposure. Although the vulnerability does not allow privilege escalation or direct availability impact, the confidentiality and integrity of data can be compromised. The requirement for user interaction limits automated exploitation but does not eliminate risk, especially in environments with frequent file exchanges or phishing campaigns. The absence of known exploits in the wild suggests limited current threat but does not preclude future exploitation.
Mitigation Recommendations
European organizations should implement the following specific mitigations: 1) Monitor Bandisoft announcements and apply patches promptly once available to address CVE-2025-33027. 2) Enforce strict policies on handling archives from untrusted or unknown sources, including scanning all compressed files with updated antivirus and endpoint detection tools before extraction. 3) Educate users about the risks of opening archives from untrusted origins and the importance of heeding security warnings, even if MotW is bypassed. 4) Consider restricting Bandizip usage to trusted users or replacing it with archive tools that correctly propagate MotW attributes. 5) Implement application whitelisting and execution control policies to prevent unauthorized code execution from user directories where extracted files reside. 6) Employ network-level protections such as email filtering and web content filtering to reduce the delivery of malicious archives. 7) Use endpoint detection and response (EDR) solutions to detect suspicious behaviors related to archive extraction and code execution. These measures, combined with user awareness, will reduce the risk of exploitation beyond generic advice.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Sweden
CVE-2025-33027: CWE-830 Inclusion of Web Functionality from an Untrusted Source in Bandisoft Bandizip
Description
In Bandisoft Bandizip through 7.37, there is a Mark-of-the-Web Bypass Vulnerability. This vulnerability allows attackers to bypass the Mark-of-the-Web protection mechanism on affected installations of Bandizip. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of archived files. When extracting files from a crafted archive that bears the Mark-of-the-Web, Bandizip does not propagate the Mark-of-the-Web to the extracted files. An attacker can leverage this vulnerability to execute arbitrary code in the context of the current user. NOTE: this is disputed because Mark-of-the-Web propagation can increase risk via security-warning habituation, and because the intended control sphere for file-origin metadata (e.g., HostUrl in Zone.Identifier) may be narrower than that for reading the file's content.
AI-Powered Analysis
Technical Analysis
CVE-2025-33027 is a vulnerability identified in Bandisoft Bandizip versions through 7.37, related to the improper handling of the Mark-of-the-Web (MotW) security feature. MotW is a Windows security mechanism that tags files downloaded from the internet or other untrusted sources to warn users and restrict certain actions. Bandizip fails to propagate the MotW attribute from archived files to the extracted files. This flaw allows attackers to craft malicious archives that, when extracted, produce files without the MotW tag, effectively bypassing Windows security warnings and restrictions. The vulnerability is classified under CWE-830, which involves the inclusion of web functionality from untrusted sources, potentially enabling execution of malicious web content or scripts. Exploitation requires user interaction, such as opening a malicious archive or visiting a malicious webpage that triggers archive extraction. Successful exploitation can lead to arbitrary code execution in the context of the current user, potentially compromising confidentiality and integrity of user data. The CVSS v3.1 base score is 6.1 (medium), reflecting network attack vector, low attack complexity, no privileges required, but user interaction needed, with partial confidentiality and integrity impact and no availability impact. No public exploits are currently known, and the vulnerability is disputed regarding the security implications of MotW propagation. However, the risk remains significant for users who extract files from untrusted sources using Bandizip.
Potential Impact
For European organizations, this vulnerability poses a moderate risk primarily to end-user systems where Bandizip is used to extract files from untrusted or external sources. Successful exploitation can lead to arbitrary code execution with the privileges of the current user, potentially enabling attackers to install malware, steal sensitive information, or move laterally within a network. The bypass of MotW reduces the effectiveness of Windows security warnings, increasing the likelihood of users executing malicious files unknowingly. Sectors with high reliance on compressed archives, such as finance, government, and critical infrastructure, may face increased exposure. Although the vulnerability does not allow privilege escalation or direct availability impact, the confidentiality and integrity of data can be compromised. The requirement for user interaction limits automated exploitation but does not eliminate risk, especially in environments with frequent file exchanges or phishing campaigns. The absence of known exploits in the wild suggests limited current threat but does not preclude future exploitation.
Mitigation Recommendations
European organizations should implement the following specific mitigations: 1) Monitor Bandisoft announcements and apply patches promptly once available to address CVE-2025-33027. 2) Enforce strict policies on handling archives from untrusted or unknown sources, including scanning all compressed files with updated antivirus and endpoint detection tools before extraction. 3) Educate users about the risks of opening archives from untrusted origins and the importance of heeding security warnings, even if MotW is bypassed. 4) Consider restricting Bandizip usage to trusted users or replacing it with archive tools that correctly propagate MotW attributes. 5) Implement application whitelisting and execution control policies to prevent unauthorized code execution from user directories where extracted files reside. 6) Employ network-level protections such as email filtering and web content filtering to reduce the delivery of malicious archives. 7) Use endpoint detection and response (EDR) solutions to detect suspicious behaviors related to archive extraction and code execution. These measures, combined with user awareness, will reduce the risk of exploitation beyond generic advice.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2025-04-15T00:00:00.000Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68fbd506f816635ddaec8851
Added to database: 10/24/2025, 7:35:34 PM
Last enriched: 10/24/2025, 7:50:32 PM
Last updated: 10/25/2025, 10:45:00 AM
Views: 13
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-9322: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in themeisle Stripe Payment Forms by WP Full Pay – Accept Credit Card Payments, Donations & Subscriptions
HighCVE-2025-8483: CWE-94 Improper Control of Generation of Code ('Code Injection') in marketingfire Discussion Board – WordPress Forum Plugin
MediumCVE-2025-8416: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in woobewoo Product Filter by WBW
HighCVE-2025-4203: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in tomdever wpForo Forum
HighCVE-2025-12034: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in alignak Fast Velocity Minify
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.