Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-63372: n/a

0
Medium
VulnerabilityCVE-2025-63372cvecve-2025-63372
Published: Tue Feb 03 2026 (02/03/2026, 00:00:00 UTC)
Source: CVE Database V5

Description

Articentgroup Zip Rar Extractor Tool 1.345.93.0 is vulnerable to Directory Traversal. The vulnerability resides in the ZIP file processing component, specifically in the functionality responsible for extracting and handling ZIP archive contents.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/11/2026, 11:22:34 UTC

Technical Analysis

CVE-2025-63372 identifies a directory traversal vulnerability in the Articentgroup Zip Rar Extractor Tool version 1.345.93.0, specifically within the ZIP file processing component responsible for extracting archive contents. Directory traversal (CWE-22) vulnerabilities occur when an application fails to properly sanitize file paths during extraction, allowing crafted ZIP archives to include file paths with sequences like "../" that traverse outside the intended directory. This can result in files being written to arbitrary locations on the filesystem, potentially overwriting critical files or planting malicious payloads. The vulnerability is remotely exploitable over the network (AV:N) without privileges (PR:N), but requires user interaction (UI:R) to initiate extraction. The CVSS v3.1 base score is 4.3 (medium), reflecting limited impact on confidentiality and availability but a potential integrity impact. No known exploits have been reported in the wild, and no patches are currently available, increasing the risk window. The lack of affected version specifics suggests the vulnerability may impact all versions of the tool prior to a future patch. This vulnerability could be leveraged as a foothold for further attacks if an attacker convinces a user to extract a malicious ZIP archive, leading to arbitrary file writes and possible execution of malicious code if system files are overwritten or malicious scripts are planted.

Potential Impact

For European organizations, this vulnerability poses a moderate risk primarily to the integrity of systems that utilize the Articentgroup Zip Rar Extractor Tool for handling ZIP archives. Successful exploitation can lead to unauthorized file writes outside the intended extraction directory, potentially overwriting system or application files, planting malware, or modifying configuration files. This can facilitate privilege escalation, persistence, or lateral movement within networks. While confidentiality and availability impacts are minimal, the integrity compromise can disrupt business operations or lead to data corruption. Organizations in sectors relying heavily on ZIP archive processing, such as software development, document management, or digital forensics, are particularly at risk. The absence of known exploits reduces immediate threat but does not eliminate the risk, especially if attackers develop exploits targeting this vulnerability. European entities with lax controls on file extraction or those that process ZIP files from untrusted sources are more vulnerable. The impact is amplified in environments where the tool is integrated into automated workflows or exposed to external users.

Mitigation Recommendations

To mitigate CVE-2025-63372, European organizations should implement the following specific measures: 1) Immediately restrict the use of the vulnerable Articentgroup Zip Rar Extractor Tool version 1.345.93.0, especially for extracting ZIP files from untrusted or external sources. 2) Employ alternative, secure ZIP extraction tools that properly sanitize file paths and prevent directory traversal. 3) Implement strict file system permissions and sandbox extraction directories to limit the impact of arbitrary file writes. 4) Monitor extraction activities and audit file system changes for unexpected file placements outside designated directories. 5) Educate users on the risks of extracting ZIP files from unknown or suspicious sources to reduce the likelihood of user-initiated exploitation. 6) Once available, promptly apply vendor patches or updates addressing this vulnerability. 7) Consider deploying endpoint detection and response (EDR) solutions capable of detecting anomalous file system modifications indicative of exploitation attempts. 8) Integrate file integrity monitoring to alert on unauthorized changes to critical files or directories. These targeted actions go beyond generic advice by focusing on controlling extraction environments and user behavior specific to this vulnerability.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-10-27T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 6982fcd3f9fa50a62f7662f2

Added to database: 2/4/2026, 8:01:23 AM

Last enriched: 2/11/2026, 11:22:34 AM

Last updated: 3/23/2026, 11:30:56 PM

Views: 55

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses