Article Details

Original Article Text

Click to Toggle View

WinRAR flaw bypasses Windows Mark of the Web security alerts. A vulnerability in the WinRAR file archiver solution could be exploited to bypass the Mark of the Web (MotW) security warning and execute arbitrary code on a Windows machine. The security issue is tracked as CVE-2025-31334 and affects all WinRAR versions except the most recent release, which is currently 7.11. Mark of the Web is a security function in Windows in the form of a metadata value (an alternate data stream named ‘zone-identifier’) to tag as potentially unsafe files downloaded from the internet. When opening an executable with the MotW tag, Windows warns the user that it was downloaded from the internet and could be harmful and offers the option to continue execution or terminate it. Symlink to executable The CVE-2025-31334 vulnerability can help a threat actor bypass the MotW security warning when opening a symbolic link (symlink) pointing to an executable file in any WinRAR version before 7.11. An attacker could execute arbitrary code by using a specially crafted symbolic link. It should be noted that a symlink can be created on Windows only with administrator permissions. The security issue received a medium severity score of 6.8 and has been fixed in the latest version of WinRAR, as noted in the applications change log: “If symlink pointing at an executable was started from WinRAR shell, the executable Mark of the Web data was ignored” - WinRAR The vulnerability was reported by Shimamine Taihei of Mitsui Bussan Secure Directions through the Information Technology Promotion Agency (IPA) in Japan. Japan’s Computer Security Incident Response Team coordinated the responsible disclosure with WinRAR’s developer. Starting version 7.10, WinRAR provides the possibility to remove from the MotW alternate data stream information (e.g. location, IP address) that could be considered a privacy risk. Threat actors, including state-sponsored ones, have exploited MotW bypasses in the past to deliver various malware without triggering the security warning. Recently, Russian hackers leveraged such a vulnerability in the 7-Zip archiver, which did not propagate the MotW when double archiving (archiving a file within another one) to run the Smokeloader malware dropper. Top 10 MITRE ATT&CK© Techniques Behind 93% of Attacks Based on an analysis of 14M malicious actions, discover the top 10 MITRE ATT&CK techniques behind 93% of attacks and how to defend against them.

Daily Brief Summary

MALWARE // Vulnerability in WinRAR Bypasses Windows Security Warnings

A critical vulnerability, identified as CVE-2025-31334, was discovered in the WinRAR file archiver that allows bypassing Windows' Mark of the Web (MotW) security alerts.

The flaw affects all versions of WinRAR prior to the latest 7.11 release and enables the execution of arbitrary code on Windows machines.

The MotW feature adds a metadata value indicating that a file is potentially unsafe if downloaded from the internet, prompting a security warning when such a file is executed.

In affected WinRAR versions, a symbolic link (symlink) can be manipulated to bypass the MotW warning, potentially allowing malware execution without user knowledge.

Creation of symbolic links in Windows generally requires administrator permissions, adding an additional security layer.

The vulnerability was responsibly reported by Shimamine Taihei through Japan’s Information Technology Promotion Agency and addressed in WinRAR version 7.11.

WinRAR has included enhancements from version 7.10 onwards to remove potentially privacy-compromising information from the MotW alternate data stream.

Previous instances of similar MotW bypass issues have been exploited by threat actors, including state-sponsored groups, to deliver malware covertly.