A critical vulnerability in WinZip that enables attackers to bypass Windows’ Mark-of-the-Web (MotW) security feature, potentially allowing malicious code to execute without warning on victims’ computers.
This serious security flaw, tracked as CVE-2025-33028, affects WinZip installations up to version 29.0 and has received a high severity CVSS score of 7.8.
Mark-of-the-Web is a Windows security mechanism that flags files downloaded from the internet, triggering warnings when users attempt to open potentially dangerous content. Researchers found that WinZip fails to maintain this important tag when extracting files from downloaded archives.
“When extracting files from an internet-downloaded ZIP archive, WinZip doesn’t propagate the MotW tag to the extracted files,” explained security researcher Enis Aksu, who discovered the vulnerability. “This allows dangerous files like macro-enabled Office documents to run without security alerts, creating a silent attack vector”.
The exploitation process is straightforward: attackers create a malicious file (such as a .docm file with dangerous macros), compress it into an archive, distribute it via phishing or compromised websites, and when victims extract it using WinZip, the extracted files execute without triggering the usual security warnings.
This vulnerability is particularly concerning because it allows attackers to bypass a fundamental Windows security control with minimal technical expertise. Successful exploitation could lead to unauthorized code execution, privilege escalation, and data theft – all while appearing legitimate to the end user.
The flaw represents an incomplete fix for a previously identified issue (CVE-2024-8811), suggesting ongoing challenges in securing archive extraction processes.
Similar MotW bypass vulnerabilities have recently affected other popular archive utilities, including 7-Zip (CVE-2025-0411) and WinRAR (CVE-2025-31334), indicating a troubling trend in archive software security that attackers exploit.
With the release of version 7.11, WinRAR has addressed a critical Mark of the Web (MOTW) bypass vulnerability. This patch enhances the application’s security by mitigating the risk associated with exploiting MOTW in potential attack vectors.
With no patch currently available for this specific WinZip vulnerability, users should:
Enterprise administrators should implement additional controls to monitor and restrict the execution of newly extracted files in corporate environments.
The discovery highlights how even routine file operations can create significant security exposures when protective measures fail, reinforcing the need for defense-in-depth approaches to cybersecurity.
With attackers increasingly targeting archive utilities, users must remain vigilant when handling files from untrusted sources.
Malware Trends Report Based on 15000 SOC Teams Incidents, Q1 2025 out!-> Get Your Free Copy
Cyber attacks continue to plague organizations worldwide, with a staggering 67% of businesses reporting they…
Ivanti has disclosed two zero-day vulnerabilities in its Endpoint Manager Mobile (EPMM) solution. When chained…
Eric Council Jr., a 26-year-old man from Huntsville, Alabama, was sentenced on May 16, 2025,…
Web Application Firewalls (WAFs) have been a critical defense mechanism protecting web applications from malicious…
As organizations transition to modern management with Microsoft Intune, migrating BitLocker recovery key management from…
A sophisticated hacking group known as UNC3944, which previously targeted major UK retail organizations, has…