We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-46652



Description

In IZArc through 4.5, there is a Mark-of-the-Web Bypass Vulnerability. When a user performs an extraction from an archive file that bears Mark-of-the-Web, Mark-of-the-Web is not propagated to the extracted files.

Reserved 2025-04-26 | Published 2025-04-26 | Updated 2025-04-28 | Assigner mitre


MEDIUM: 6.1CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

Problem types

CWE-830 Inclusion of Web Functionality from an Untrusted Source

Product status

Default status
unknown

Any version
affected

References

github.com/.../IZArc Mark-of-the-Web Bypass Vulnerability.md

github.com/...rgonis/security/advisories/GHSA-637g-8v47-79mv

www.izarc.org/news

cve.org (CVE-2025-46652)

nvd.nist.gov (CVE-2025-46652)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-46652

Support options

Helpdesk Chat, Email, Knowledgebase