Cyber Posture

CVE-2025-1240

High

Published: 11 February 2025

Published
11 February 2025
Modified
18 August 2025
KEV Added
Patch
CVSS Score 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
EPSS Score 0.3329 96.9th percentile
Risk Priority 38 60% EPSS · 20% KEV · 20% CVSS

Description

WinZip 7Z File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of WinZip. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of 7Z files. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-24986.

Security Summary

CVE-2025-1240 is an out-of-bounds write vulnerability in the 7Z file parsing component of WinZip, enabling remote code execution. The flaw stems from insufficient validation of user-supplied data during 7Z file processing, allowing a write past the end of an allocated buffer. This affects WinZip installations and was originally tracked as ZDI-CAN-24986, with a CVSS v3.1 base score of 8.8 (AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H), mapped to CWE-787.

Remote attackers can exploit this vulnerability by tricking a target user into visiting a malicious web page or opening a malicious 7Z file. No privileges are required on the attacker's part, but user interaction is necessary. Successful exploitation allows the attacker to execute arbitrary code in the context of the WinZip process.

The Zero Day Initiative published advisory ZDI-25-047 detailing the vulnerability, available at https://www.zerodayinitiative.com/advisories/ZDI-25-047/.

Details

CWE(s)
CWE-787

Affected Products

winzip
winzip
18.0 — 18.0.16371 · 27.0 — 27.0.16370 · 76.0 — 76.8

References