Critical 7-Zip RCE Vulnerability Now Under Active Exploitation

Active Exploitation Confirmed for Critical 7-Zip RCE Vulnerability (CVE-2025-11001)

HIGH
December 5, 2025
4m read
VulnerabilityPatch ManagementCyberattack

Related Entities

Organizations

NHS England DigitalQualys

Products & Tech

7-Zip

CVE Identifiers

CVE-2025-11001
HIGH
CVSS:7
CVE-2025-11002
HIGH

Full Report

Executive Summary

A critical remote code execution (RCE) vulnerability, CVE-2025-11001, in the widely-used 7-Zip file archiving utility is now under active exploitation. The vulnerability, first disclosed in October 2025, has a CVSS score of 7.0 and affects all versions of 7-Zip prior to 25.0.0. The flaw is a path traversal weakness that allows an attacker to execute arbitrary code by tricking a user into extracting a malicious ZIP archive. Due to the ubiquity of 7-Zip in both personal and enterprise environments, the potential for widespread compromise is significant. NHS England Digital has confirmed active exploitation and issued an advisory on November 18, 2025, urging immediate patching.


Vulnerability Details

CVE-2025-11001 is a path traversal (also known as "Zip Slip") vulnerability. It stems from the improper handling of symbolic links within a ZIP archive. An attacker can create a malicious archive containing a symbolic link that points to a location outside of the intended extraction directory (e.g., ../../../../../../windows/system32/). When a vulnerable version of 7-Zip extracts this archive, it follows the symbolic link and writes a subsequent file (e.g., a malicious DLL or executable) to that sensitive system location. This can lead to arbitrary code execution with the privileges of the user running 7-Zip.

A related flaw, CVE-2025-11002, which shares the same root cause, is also fixed in the patched version.

Affected Systems

  • 7-Zip: All versions prior to 25.0.0.

Exploitation Status

  • Active Exploitation: Confirmed in the wild. Attacks have been observed targeting the healthcare and finance sectors.
  • Attack Vector: Social engineering. Attackers trick users into downloading and extracting a malicious ZIP file, often delivered via phishing emails.

Impact Assessment

Successful exploitation of CVE-2025-11001 allows an attacker to achieve remote code execution on the victim's machine. This can be a stepping stone for a more comprehensive attack, including:

  • Ransomware Deployment: The attacker can drop and execute a ransomware payload.
  • Credential Theft: A malicious payload can be used to steal passwords, session cookies, and other sensitive data.
  • Persistent Access: The attacker can plant a backdoor or RAT (Remote Access Trojan) for long-term access to the compromised system and network.

Because 7-Zip is often used in automated processes on servers, the vulnerability could also be triggered without direct user interaction if a server-side application automatically extracts untrusted archives. In this scenario, the code would execute with the privileges of the server's service account, which could be highly privileged.

Cyber Observables for Detection

  • File Name: Look for the extraction of ZIP files from untrusted sources, such as email attachments.
  • Process Name: Monitor for the 7z.exe or 7zG.exe process writing files to unexpected locations outside of the user's intended extraction folder (e.g., C:\Windows, C:\Program Files).
  • Log Source: EDR logs, File Integrity Monitoring (FIM) logs, and antivirus logs.

Detection Methods

  1. Endpoint Detection and Response (EDR): Configure EDR rules to alert when the 7-Zip process writes files to sensitive system directories. This is a high-fidelity indicator of exploitation.
  2. Asset Inventory: Use system management tools or asset inventory scanners to identify all systems with vulnerable versions of 7-Zip installed (< 25.0.0).
  3. Email Security Gateway: Filter and block emails containing suspicious ZIP attachments, especially from unknown senders.

Remediation Steps

  1. Update Immediately: The primary remediation is to update all installations of 7-Zip to version 25.0.0 or later. This should be treated as a high-priority patch. See M1051 - Update Software.
  2. Automate Patching: This incident highlights the risk of manually-patched software. Organizations should use automated patch management systems to ensure that common utilities like 7-Zip are kept up-to-date across the entire enterprise.
  3. User Training: Remind users not to open or extract attachments from untrusted or unsolicited emails. See M1017 - User Training.
  4. Restrict Execution: As a compensating control, consider using application control policies (e.g., AppLocker) to prevent users from running unapproved software, although this may be difficult to implement for a common utility like 7-Zip.

Timeline of Events

1
October 1, 2025
CVE-2025-11001 in 7-Zip is first disclosed.
2
November 18, 2025
NHS England Digital issues an advisory confirming active exploitation of the vulnerability.
3
December 4, 2025
Security vendors report on widespread active exploitation campaigns.
4
December 5, 2025
This article was published

MITRE ATT&CK Mitigations

Updating all 7-Zip installations to version 25.0.0 or later is the only way to fully remediate the vulnerability.

Mapped D3FEND Techniques:

Educating users about the dangers of opening and extracting attachments from untrusted sources helps prevent the initial delivery of the malicious archive.

Application control policies can prevent the execution of malicious payloads dropped by the exploit, though they won't stop the initial file write.

Mapped D3FEND Techniques:

D3FEND Defensive Countermeasures

The primary and most urgent countermeasure is to update all instances of 7-Zip across the enterprise to the patched version 25.0.0 or later. Due to the widespread use of this utility on both user endpoints and servers, a comprehensive asset inventory must be conducted to find all vulnerable installations. Use automated patch management tools to deploy the update systematically. This is not a vulnerability that can be mitigated by network controls alone, as the exploit is triggered locally by the user. Given that active exploitation is confirmed, this patch should be treated as critical and deployed with the highest priority to close the vulnerability.

For detection and response, configure EDR solutions to monitor the behavior of 7-Zip processes (7z.exe, 7zG.exe). Create a specific detection rule that alerts when a 7-Zip process attempts to write a file to a sensitive system directory, such as C:\Windows, C:\Program Files, or a user's startup folder. This is a highly specific and anomalous behavior for a file archiver and is a strong indicator of an attempt to exploit CVE-2025-11001. This rule can serve as a virtual patch, detecting and allowing response to exploitation attempts on systems that have not yet been updated.

Sources & References

7-Zip RCE Flaw Now Actively Exploited, Patch Immediately
BleepingComputer (bleepingcomputer.com) December 4, 2025

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

7-ZipRCEVulnerabilityPath TraversalZip SlipPatch Management

📢 Share This Article

Help others stay informed about cybersecurity threats

Continue Reading