Cyber Security

WinZip MotW Bypass Vulnerability Let Hackers Execute Malicious Code Silently

A critical vulnerability in WinZip that enables attackers to bypass Windows’ Mark-of-the-Web (MotW) security feature, potentially allowing malicious code to execute without warning on victims’ computers.

This serious security flaw, tracked as CVE-2025-33028, affects WinZip installations up to version 29.0 and has received a high severity CVSS score of 7.8.

Mark-of-the-Web is a Windows security mechanism that flags files downloaded from the internet, triggering warnings when users attempt to open potentially dangerous content. Researchers found that WinZip fails to maintain this important tag when extracting files from downloaded archives.

WinZip MotW Bypass Vulnerability

“When extracting files from an internet-downloaded ZIP archive, WinZip doesn’t propagate the MotW tag to the extracted files,” explained security researcher Enis Aksu, who discovered the vulnerability. “This allows dangerous files like macro-enabled Office documents to run without security alerts, creating a silent attack vector”.

The exploitation process is straightforward: attackers create a malicious file (such as a .docm file with dangerous macros), compress it into an archive, distribute it via phishing or compromised websites, and when victims extract it using WinZip, the extracted files execute without triggering the usual security warnings.

This vulnerability is particularly concerning because it allows attackers to bypass a fundamental Windows security control with minimal technical expertise. Successful exploitation could lead to unauthorized code execution, privilege escalation, and data theft – all while appearing legitimate to the end user.

The flaw represents an incomplete fix for a previously identified issue (CVE-2024-8811), suggesting ongoing challenges in securing archive extraction processes.

Similar MotW bypass vulnerabilities have recently affected other popular archive utilities, including 7-Zip (CVE-2025-0411) and WinRAR (CVE-2025-31334), indicating a troubling trend in archive software security that attackers exploit.

With the release of version 7.11, WinRAR has addressed a critical Mark of the Web (MOTW) bypass vulnerability. This patch enhances the application’s security by mitigating the risk associated with exploiting MOTW in potential attack vectors.

With no patch currently available for this specific WinZip vulnerability, users should:

  • Exercise extreme caution when opening archive files from untrusted sources
  • Consider using alternative archive utilities with proper MotW handling
  • Scan all extracted files with updated antivirus software before opening
  • Disable automatic execution of macros in Office applications

Enterprise administrators should implement additional controls to monitor and restrict the execution of newly extracted files in corporate environments.

The discovery highlights how even routine file operations can create significant security exposures when protective measures fail, reinforcing the need for defense-in-depth approaches to cybersecurity.

With attackers increasingly targeting archive utilities, users must remain vigilant when handling files from untrusted sources.

Malware Trends Report Based on 15000 SOC Teams Incidents, Q1 2025 out!-> Get Your Free Copy

Guru Baran

Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Recent Posts

67% of Organizations Faces Cyber Attack in The Past 12 Months – New Report

Cyber attacks continue to plague organizations worldwide, with a staggering 67% of businesses reporting they…

48 minutes ago

Ivanti EPMM 0-day Vulnerability Actively Exploited in the Wild

Ivanti has disclosed two zero-day vulnerabilities in its Endpoint Manager Mobile (EPMM) solution. When chained…

56 minutes ago

Hacker Charged for Hijacking SEC Account to Promote Fake Bitcoin News

Eric Council Jr., a 26-year-old man from Huntsville, Alabama, was sentenced on May 16, 2025,…

1 hour ago

AI Web Application Firewalls Bypassed Using Prompt Injection Techniques

Web Application Firewalls (WAFs) have been a critical defense mechanism protecting web applications from malicious…

1 hour ago

Microsoft Published a Practical Guide for Migrating BitLocker Recovery Key Management From ConfigMgr to Intune

As organizations transition to modern management with Microsoft Intune, migrating BitLocker recovery key management from…

2 hours ago

Google Details Hackers Behind UK Retailers Attack Now Targeting US

A sophisticated hacking group known as UNC3944, which previously targeted major UK retail organizations, has…

2 hours ago