A critical remote code execution (RCE) vulnerability, CVE-2025-11001, in the widely-used 7-Zip file archiving utility is now under active exploitation. The vulnerability, first disclosed in October 2025, has a CVSS score of 7.0 and affects all versions of 7-Zip prior to 25.0.0. The flaw is a path traversal weakness that allows an attacker to execute arbitrary code by tricking a user into extracting a malicious ZIP archive. Due to the ubiquity of 7-Zip in both personal and enterprise environments, the potential for widespread compromise is significant. NHS England Digital has confirmed active exploitation and issued an advisory on November 18, 2025, urging immediate patching.
CVE-2025-11001 is a path traversal (also known as "Zip Slip") vulnerability. It stems from the improper handling of symbolic links within a ZIP archive. An attacker can create a malicious archive containing a symbolic link that points to a location outside of the intended extraction directory (e.g., ../../../../../../windows/system32/). When a vulnerable version of 7-Zip extracts this archive, it follows the symbolic link and writes a subsequent file (e.g., a malicious DLL or executable) to that sensitive system location. This can lead to arbitrary code execution with the privileges of the user running 7-Zip.
A related flaw, CVE-2025-11002, which shares the same root cause, is also fixed in the patched version.
Successful exploitation of CVE-2025-11001 allows an attacker to achieve remote code execution on the victim's machine. This can be a stepping stone for a more comprehensive attack, including:
Because 7-Zip is often used in automated processes on servers, the vulnerability could also be triggered without direct user interaction if a server-side application automatically extracts untrusted archives. In this scenario, the code would execute with the privileges of the server's service account, which could be highly privileged.
7z.exe or 7zG.exe process writing files to unexpected locations outside of the user's intended extraction folder (e.g., C:\Windows, C:\Program Files).M1051 - Update Software.M1017 - User Training.Updating all 7-Zip installations to version 25.0.0 or later is the only way to fully remediate the vulnerability.
Mapped D3FEND Techniques:
Educating users about the dangers of opening and extracting attachments from untrusted sources helps prevent the initial delivery of the malicious archive.
Application control policies can prevent the execution of malicious payloads dropped by the exploit, though they won't stop the initial file write.
Mapped D3FEND Techniques:
The primary and most urgent countermeasure is to update all instances of 7-Zip across the enterprise to the patched version 25.0.0 or later. Due to the widespread use of this utility on both user endpoints and servers, a comprehensive asset inventory must be conducted to find all vulnerable installations. Use automated patch management tools to deploy the update systematically. This is not a vulnerability that can be mitigated by network controls alone, as the exploit is triggered locally by the user. Given that active exploitation is confirmed, this patch should be treated as critical and deployed with the highest priority to close the vulnerability.
For detection and response, configure EDR solutions to monitor the behavior of 7-Zip processes (7z.exe, 7zG.exe). Create a specific detection rule that alerts when a 7-Zip process attempts to write a file to a sensitive system directory, such as C:\Windows, C:\Program Files, or a user's startup folder. This is a highly specific and anomalous behavior for a file archiver and is a strong indicator of an attempt to exploit CVE-2025-11001. This rule can serve as a virtual patch, detecting and allowing response to exploitation attempts on systems that have not yet been updated.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats