CVE-2018-20250
Summary
| CVE | CVE-2018-20250 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2019-02-05 20:29:00 UTC |
| Updated | 2019-10-09 23:39:00 UTC |
| Description | In WinRAR versions prior to and including 5.61, There is path traversal vulnerability when crafting the filename field of the ACE format (in UNACEV2.dll). When the filename field is manipulated with specific patterns, the destination (extraction) folder is ignored, thus treating the filename as an absolute path. |
Risk And Classification
EPSS: 0.934620000 probability, percentile 0.998190000 (date 2026-04-02)
CISA KEV: Listed on 2022-02-15; due 2022-08-15; ransomware use Known
Problem Types: CWE-22
CISA Known Exploited Vulnerability
| Vendor | RARLAB |
|---|---|
| Product | WinRAR |
| Name | WinRAR Absolute Path Traversal Vulnerability |
| Required Action | Apply updates per vendor instructions. |
| Notes | https://nvd.nist.gov/vuln/detail/CVE-2018-20250 |
NVD Known Affected Configurations (CPE 2.3)
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| WinRAR Multiple Security Vulnerabilities | BID | www.securityfocus.com | Third Party Advisory, VDB Entry |
| GitHub - blau72/CVE-2018-20250-WinRAR-ACE: Proof of concept code in C# to exploit the WinRAR ACE file extraction path (CVE-2018-20250). | MISC | github.com | Exploit, Third Party Advisory |
| RARLAB WinRAR ACE Format Input Validation Remote Code Execution ≈ Packet Storm | MISC | packetstormsecurity.com | Third Party Advisory, VDB Entry |
| WinRAR 5.61 - Path Traversal | EXPLOIT-DB | www.exploit-db.com | Exploit, Third Party Advisory, VDB Entry |
| RARLAB WinRAR ACE Format Input Validation Remote Code Execution | MISC | www.rapid7.com | Third Party Advisory |
| RARLAB WinRAR 5.61 - ACE Format Input Validation Remote Code Execution (Metasploit) - Windows local Exploit | EXPLOIT-DB | www.exploit-db.com | Exploit, Third Party Advisory, VDB Entry |
| Extracting a 19 Year Old Code Execution from WinRAR - Check Point Research | MISC | research.checkpoint.com | Exploit, Third Party Advisory |
| WinRAR download and support: Whats New | MISC | www.win-rar.com | Vendor Advisory |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
| CISA Known Exploited Vulnerabilities catalog | CISA | www.cisa.gov | kev |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.