First published: Tue Apr 15 2025(Updated: )
In WinZip through 29.0, there is a Mark-of-the-Web Bypass Vulnerability because of an incomplete fix for CVE-2024-8811. This vulnerability allows attackers to bypass the Mark-of-the-Web protection mechanism on affected installations of WinZip. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of archived files. When extracting files from a crafted archive that bears the Mark-of-the-Web, WinZip does not propagate the Mark-of-the-Web to the extracted files. An attacker can leverage this vulnerability to execute arbitrary code in the context of the current user.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Corel WinZip | <=29.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-33028 is rated as a medium severity vulnerability due to its potential to allow Mark-of-the-Web protection bypass.
To fix CVE-2025-33028, you should upgrade to the latest version of WinZip that addresses this vulnerability.
CVE-2025-33028 allows attackers to bypass security mechanisms, potentially leading to unauthorized file access.
Yes, CVE-2025-33028 requires user interaction for exploitation, making it dependent on the actions of the user.
CVE-2025-33028 affects WinZip versions up to and including 29.0.