A vulnerability has been discovered within the very fashionable, free file-compressing instrument 7-Zip. The flaw, tracked as CVE-2025-11001, has a public exploit, resulting in a high-risk warning from the UK’s NHS England Digital.
Whereas the NHS confirmed lively exploitation has not been noticed within the wild, the general public PoC means the danger of future assaults is extraordinarily excessive. The vulnerability was found by Ryota Shiga of GMO Flatt Safety Inc., with assist from their AI instrument AppSec Auditor Takumi.
What’s the Drawback?
The difficulty is said to how older 7-Zip variations deal with symbolic hyperlinks inside ZIP recordsdata (a symbolic hyperlink is a shortcut to a different file or folder). As defined by Development Micro’s Zero Day Initiative (ZDI), which first revealed the vulnerability final month, it’s a Listing Traversal RCE flaw.
This implies, a specifically made ZIP file can trick this system into traversing (shifting) to unauthorised system directories throughout extraction, permitting an attacker to run undesirable packages or “execute arbitrary code.” The difficulty has a CVSS threat rating of seven.0 (Excessive), and exploiting it requires person interplay (the goal should open the malicious ZIP file).
In response to a weblog publish from vulnerability detection platform Mondoo, this flaw is especially harmful for 3 causes. First, the extraction of a malicious ZIP can enable an attacker to run code utilizing a high-level account, equivalent to a service account or privileged person, probably resulting in a full system takeover. Second, it’s comparatively straightforward to take advantage of (solely requiring a person to open the archive), and third, 7-Zip’s widespread use offers an enormous assault floor of unpatched methods.
Microsoft Flags Exercise Linked to CVE 2025 11001
The hazard stage elevated dramatically when safety researcher Dominik (recognized on-line as pacbypass) publicly shared a working proof-of-concept (PoC) exploit. This ready-to-use code offers cybercriminals with a straightforward blueprint for assaults, seemingly dashing up the unfold of assaults. This flaw impacts solely Home windows methods and is most important when recordsdata are extracted underneath extremely privileged accounts, which might result in a full system takeover.
Microsoft has tracked malicious exercise linked to this vulnerability underneath the label Exploit:Python/CVE 2025 11001.SA!MTB, a detection identify relatively than a household title, but it nonetheless exhibits lively use of the general public code in malware campaigns.
Learn how to Keep Protected
The difficulty was mounted with model 25.00 in July 2025. Nevertheless, as Dominik Richter, CPO and Co-founder of Mondoo, informed Hackread.com, the software program lacks an inner replace mechanism; subsequently, updates have to be carried out manually by the person or managed by means of enterprise instruments, scripts, or deployment methods like Microsoft Intune.
This lack of automated patching “implies that it’s extremely seemingly that many methods are nonetheless operating the older model that’s susceptible to this CVE,” Richter famous.
To replace manually, customers should discover all 7-Zip installations older than model 25.00 on Home windows machines and promptly set up the present model, 25.01. Or, obtain the most recent model from 7-Zip’s official obtain web page.

