CVE-2025-11001

NameCVE-2025-11001
Description7-Zip ZIP File Parsing Directory Traversal Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of 7-Zip. Interaction with this product is required to exploit this vulnerability but attack vectors may vary depending on the implementation. The specific flaw exists within the handling of symbolic links in ZIP files. Crafted data in a ZIP file can cause the process to traverse to unintended directories. An attacker can leverage this vulnerability to execute code in the context of a service account. Was ZDI-CAN-26753.
SourceCVE (at NVD; CERT, ENISA, LWN, oss-sec, fulldisc, Debian ELTS, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
7zip (PTS)bookworm22.01+dfsg-8+deb12u1vulnerable
trixie25.01+dfsg-1~deb13u1fixed
forky, sid25.01+dfsg-4fixed
p7zip (PTS)bookworm, bullseye16.02+dfsg-8vulnerable
trixie16.02+transitional.1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
7zipsourcetrixie25.01+dfsg-1~deb13u1
7zipsource(unstable)25.00+dfsg-1
p7zipsource(unstable)16.02+transitional.1

Notes

[bookworm] - 7zip <no-dsa> (Minor issue)
[bookworm] - p7zip <no-dsa> (Minor issue)
[bullseye] - p7zip <postponed> (Minor issue; can be fixed in next update)
Since p7zip/16.02+transitional.1 src:p7zip is only a empty source package
depending on 7zip. Mark this version as fixed version.
https://github.com/ip7z/7zip/releases/tag/25.00
https://www.zerodayinitiative.com/advisories/ZDI-25-949/

Search for package or bug name: Reporting problems