Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-52331: n/a

0
Unknown
VulnerabilityCVE-2025-52331cvecve-2025-52331
Published: Wed Nov 12 2025 (11/12/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

Cross-site scripting (XSS) vulnerability in the generate report functionality in Rarlab WinRAR 7.11, allows attackers to disclose user information such as the computer username, generated report directory, and IP address. The generate report command includes archived file names without validation in the HTML report, which allows potentially malicious HTML tags to be injected into the report. User interaction is required. User must use the "generate report" functionality and open the report.

AI-Powered Analysis

AILast updated: 11/12/2025, 17:24:14 UTC

Technical Analysis

CVE-2025-52331 is a cross-site scripting (XSS) vulnerability found in the generate report functionality of WinRAR version 7.11. The vulnerability arises because the generate report command includes archived file names directly into an HTML report without proper input validation or sanitization. Malicious actors can craft archive file names containing HTML or JavaScript code, which when included in the report, execute in the context of the user's environment upon opening the report. This can lead to the disclosure of sensitive information such as the computer's username, the directory where the report is generated, and the user's IP address. The attack requires user interaction: the user must invoke the generate report feature and then open the generated HTML report file. Although no known exploits are currently in the wild and no patches have been released, the vulnerability poses a risk of information leakage and potential further exploitation if combined with other attack vectors. The lack of a CVSS score indicates that the vulnerability has not yet been fully assessed, but the technical details suggest a moderate to high risk due to the sensitive nature of the information exposed and the ease of injecting malicious content via file names.

Potential Impact

For European organizations, this vulnerability could lead to unauthorized disclosure of sensitive user and system information, which may facilitate further targeted attacks such as spear phishing or network reconnaissance. Organizations with high usage of WinRAR 7.11, especially in sectors handling sensitive or personal data (e.g., finance, healthcare, government), may face increased risk of data leakage. The requirement for user interaction reduces the likelihood of widespread automated exploitation but does not eliminate risk in environments where users frequently generate and open reports. The exposure of internal IP addresses and usernames could aid attackers in mapping internal networks or escalating privileges. Additionally, organizations with strict data protection regulations such as GDPR must consider the implications of such data leakage and the potential for regulatory penalties if personal data is exposed.

Mitigation Recommendations

1. Avoid using the generate report functionality in WinRAR 7.11 until a patch is released. 2. Educate users about the risks of opening generated reports, especially those containing archive file names from untrusted sources. 3. Implement strict input validation and sanitization on file names before including them in reports, if customization or scripting is possible. 4. Monitor and restrict the use of WinRAR 7.11 in sensitive environments or replace it with alternative archiving tools that do not exhibit this vulnerability. 5. Employ endpoint security solutions that can detect and block suspicious HTML or script execution from local files. 6. Maintain up-to-date backups and incident response plans to quickly address any exploitation attempts. 7. Regularly audit and review user activities involving report generation to detect anomalous behavior. 8. Follow vendor communications closely for patches or updates addressing this vulnerability and apply them promptly once available.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-06-16T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 6914c133f490e7dc3cc5b761

Added to database: 11/12/2025, 5:17:39 PM

Last enriched: 11/12/2025, 5:24:14 PM

Last updated: 11/12/2025, 6:36:04 PM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats