Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-33027: CWE-830 Inclusion of Web Functionality from an Untrusted Source in Bandisoft Bandizip

0
Medium
VulnerabilityCVE-2025-33027cvecve-2025-33027cwe-830
Published: Tue Apr 15 2025 (04/15/2025, 00:00:00 UTC)
Source: CVE Database V5
Vendor/Project: Bandisoft
Product: Bandizip

Description

In Bandisoft Bandizip through 7.37, there is a Mark-of-the-Web Bypass Vulnerability. This vulnerability allows attackers to bypass the Mark-of-the-Web protection mechanism on affected installations of Bandizip. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of archived files. When extracting files from a crafted archive that bears the Mark-of-the-Web, Bandizip does not propagate the Mark-of-the-Web to the extracted files. An attacker can leverage this vulnerability to execute arbitrary code in the context of the current user. NOTE: this is disputed because Mark-of-the-Web propagation can increase risk via security-warning habituation, and because the intended control sphere for file-origin metadata (e.g., HostUrl in Zone.Identifier) may be narrower than that for reading the file's content.

AI-Powered Analysis

AILast updated: 10/24/2025, 19:50:32 UTC

Technical Analysis

CVE-2025-33027 is a vulnerability identified in Bandisoft Bandizip versions through 7.37, related to the improper handling of the Mark-of-the-Web (MotW) security feature. MotW is a Windows security mechanism that tags files downloaded from the internet or other untrusted sources to warn users and restrict certain actions. Bandizip fails to propagate the MotW attribute from archived files to the extracted files. This flaw allows attackers to craft malicious archives that, when extracted, produce files without the MotW tag, effectively bypassing Windows security warnings and restrictions. The vulnerability is classified under CWE-830, which involves the inclusion of web functionality from untrusted sources, potentially enabling execution of malicious web content or scripts. Exploitation requires user interaction, such as opening a malicious archive or visiting a malicious webpage that triggers archive extraction. Successful exploitation can lead to arbitrary code execution in the context of the current user, potentially compromising confidentiality and integrity of user data. The CVSS v3.1 base score is 6.1 (medium), reflecting network attack vector, low attack complexity, no privileges required, but user interaction needed, with partial confidentiality and integrity impact and no availability impact. No public exploits are currently known, and the vulnerability is disputed regarding the security implications of MotW propagation. However, the risk remains significant for users who extract files from untrusted sources using Bandizip.

Potential Impact

For European organizations, this vulnerability poses a moderate risk primarily to end-user systems where Bandizip is used to extract files from untrusted or external sources. Successful exploitation can lead to arbitrary code execution with the privileges of the current user, potentially enabling attackers to install malware, steal sensitive information, or move laterally within a network. The bypass of MotW reduces the effectiveness of Windows security warnings, increasing the likelihood of users executing malicious files unknowingly. Sectors with high reliance on compressed archives, such as finance, government, and critical infrastructure, may face increased exposure. Although the vulnerability does not allow privilege escalation or direct availability impact, the confidentiality and integrity of data can be compromised. The requirement for user interaction limits automated exploitation but does not eliminate risk, especially in environments with frequent file exchanges or phishing campaigns. The absence of known exploits in the wild suggests limited current threat but does not preclude future exploitation.

Mitigation Recommendations

European organizations should implement the following specific mitigations: 1) Monitor Bandisoft announcements and apply patches promptly once available to address CVE-2025-33027. 2) Enforce strict policies on handling archives from untrusted or unknown sources, including scanning all compressed files with updated antivirus and endpoint detection tools before extraction. 3) Educate users about the risks of opening archives from untrusted origins and the importance of heeding security warnings, even if MotW is bypassed. 4) Consider restricting Bandizip usage to trusted users or replacing it with archive tools that correctly propagate MotW attributes. 5) Implement application whitelisting and execution control policies to prevent unauthorized code execution from user directories where extracted files reside. 6) Employ network-level protections such as email filtering and web content filtering to reduce the delivery of malicious archives. 7) Use endpoint detection and response (EDR) solutions to detect suspicious behaviors related to archive extraction and code execution. These measures, combined with user awareness, will reduce the risk of exploitation beyond generic advice.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2025-04-15T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68fbd506f816635ddaec8851

Added to database: 10/24/2025, 7:35:34 PM

Last enriched: 10/24/2025, 7:50:32 PM

Last updated: 10/25/2025, 10:45:00 AM

Views: 13

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats