Home

Description

A security vulnerability has been detected in Rarlab RAR App up to 7.11 Build 127 on Android. This affects an unknown part of the component com.rarlab.rar. Such manipulation leads to path traversal. It is possible to launch the attack remotely. Attacks of this nature are highly complex. It is indicated that the exploitability is difficult. The exploit has been disclosed publicly and may be used. Upgrading to version 7.20 build 128 is able to mitigate this issue. You should upgrade the affected component. The vendor responded very professional: "This is the real vulnerability affecting RAR for Android only. WinRAR and Unix RAR versions are not affected. We already fixed it in RAR for Android 7.20 build 128 and we publicly mentioned it in that version changelog. (...) To avoid confusion among users, it would be useful if such disclosure emphasizes that it is RAR for Android only issue and WinRAR isn't affected."

PUBLISHED Reserved 2025-12-05 | Published 2025-12-05 | Updated 2025-12-05 | Assigner VulDB




LOW: 2.3CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P
MEDIUM: 5.0CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C
MEDIUM: 5.0CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C
5.1AV:N/AC:H/Au:N/C:P/I:P/A:P/E:POC/RL:OF/RC:C

Problem types

Path Traversal

Product status

7.11 Build 127
affected

7.20 build 128
unaffected

Timeline

2025-12-05:Advisory disclosed
2025-12-05:VulDB entry created
2025-12-05:VulDB entry last update

Credits

Lu1u (VulDB User) reporter

References

vuldb.com/?id.334491 (VDB-334491 | Rarlab RAR App com.rarlab.rar path traversal) vdb-entry

vuldb.com/?ctiid.334491 (VDB-334491 | CTI Indicators (IOB, IOC, TTP)) signature permissions-required

vuldb.com/?submit.697375 (Submit #697375 | Rarlab RAR APP(com.rarlab.rar) <=V7.11.build127 Path Traversal) third-party-advisory

github.com/...Arbitrary File Write and Read Vulnerability.md exploit

cve.org (CVE-2025-14111)

nvd.nist.gov (CVE-2025-14111)