CVE-2025-11001# 🔥 **CVE-2025-11001: Critical 7-Zip RCE Vulnerability** 🔥

⚠️ **Severity**: Critical (Remote Code Execution)
🛠️ **Affected**: 7-Zip < 25.00 (Windows + Linux p7zip)
🧨 **Exploit Type**: Malicious ZIP → Directory Traversal + RCE
🔗 **CWE**: CWE-22 (Path Traversal)
🕵️♂️ **Public Exploit**: Yes, already circulating
📅 **Disclosed**: October 7, 2025
### 🎯 How It Works
Attackers craft a booby-trapped .zip file containing `../../evil.exe` or similar paths. When you extract it with vulnerable 7-Zip → bam! Files are written anywhere on the system → instant code execution. 💥
### 🧨 Usage:
```
python3 CVE-2025-11001.py -t "C:\Users\pac\Desktop" -o demo.zip --data-file calc.exe
```
### 🖥️ Affected Platforms (as of Nov 2025)
| Platform | Status | Emoji Verdict |
|----------------|-------------------------|--------------------|
| Windows 7-Zip | < 25.00 → Vulnerable | ❌ Patch NOW! |
| Debian p7zip | Still unpatched | 😱 Danger zone |
| Ubuntu | Partial fixes | ⚠️ Update ASAP |
| 7-Zip ≥ 25.00 | Fixed | ✅ Safe |
### 🛡️ Immediate Fix
🚀 **Download 7-Zip 25.00+** → https://github.com/ip7z/7zip/releases/tag/25.00
🔍 Scan with Nessus (plugin 270234)
🏖️ Extract unknown ZIPs only in sandbox
Don’t be the next victim — patch today and stay safe out there! 🛡️✨
[4.0K] /data/pocs/a89fcb97478c8e4c93a32370eca514d3dd041b74
├── [2.3K] CVE-2025-11001.py
└── [1.6K] README.md
1 directory, 2 files