CVE-2025-11002
Unknown Unknown - Not Provided
Directory Traversal in 7-Zip ZIP Parsing Enables Remote Code Execution

Publication date: 2026-01-23

Last updated on: 2026-02-26

Assigner: Zero Day Initiative

Description
7-Zip ZIP File Parsing Directory Traversal Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of 7-Zip. Interaction with this product is required to exploit this vulnerability but attack vectors may vary depending on the implementation. The specific flaw exists within the handling of symbolic links in ZIP files. Crafted data in a ZIP file can cause the process to traverse to unintended directories. An attacker can leverage this vulnerability to execute code in the context of a service account. Was ZDI-CAN-26743.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-01-23
Last Modified
2026-02-26
Generated
2026-05-07
AI Q&A
2026-01-23
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
7-zip 7-zip 24.09
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-22 The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability in 7-Zip involves improper handling of symbolic links in ZIP files, allowing crafted ZIP files to cause directory traversal to unintended locations. When a user interacts with such a malicious ZIP file, an attacker can execute arbitrary code within the context of a service account. [1]


What immediate steps should I take to mitigate this vulnerability?

To mitigate this vulnerability, avoid opening untrusted or suspicious ZIP files with 7-Zip, especially those received from unverified sources. Ensure that users are aware of the risk of interacting with crafted ZIP files containing symbolic links. Applying updates or patches from 7-Zip when available is recommended to fix the vulnerability. Additionally, restrict user permissions to limit the impact of potential exploitation. [1]


How can this vulnerability impact me? :

If exploited, this vulnerability can allow an attacker to execute arbitrary code on your system with the privileges of a service account, potentially compromising confidentiality, integrity, and availability of your data and system. [1]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart