Name | CVE-2025-0411 |
Description | 7-Zip Mark-of-the-Web Bypass Vulnerability. This vulnerability allows remote attackers to bypass the Mark-of-the-Web protection mechanism on affected installations of 7-Zip. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of archived files. When extracting files from a crafted archive that bears the Mark-of-the-Web, 7-Zip does not propagate the Mark-of-the-Web to the extracted files. An attacker can leverage this vulnerability to execute arbitrary code in the context of the current user. Was ZDI-CAN-25456. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
Vulnerable and fixed packages
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|
7zip (PTS) | bookworm | 22.01+dfsg-8+deb12u1 | fixed |
| sid, trixie | 24.09+dfsg-6 | fixed |
p7zip (PTS) | bookworm, bullseye | 16.02+dfsg-8 | fixed |
| sid, trixie | 16.02+transitional.1 | fixed |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|
7zip | source | (unstable) | (not affected) | | | |
p7zip | source | (unstable) | (not affected) | | | |
Notes
- 7zip <not-affected> (Affects only 7-Zip on Windows handling Mark of the Web (MoTW) metadata)
- p7zip <not-affected> (Affects only 7-Zip on Windows handling Mark of the Web (MoTW) metadata)
https://www.zerodayinitiative.com/advisories/ZDI-25-045/
https://www.openwall.com/lists/oss-security/2025/01/24/6