Still using WinRAR? It might be time for an update, as a zero-day vulnerability is being 'exploited in the wild in the guise of job application documents'

WinRAR logo on website
(Image credit: WinRAR)

There's something about the WinRAR stacked-book logo that makes me all nostalgic, giving me a proper case of the warm fuzzies deep inside. What turns those fuzzies into ouchies, however, is the idea of a zero-day vulnerability in my beloved file compression and extraction tool.

ESET Research first identified the exploit, now classified under the name CVE-2025-8088, back in July, and published a full breakdown of its findings yesterday. The vulnerability is believed to be in active use by a Russia-aligned hacking group working under the alias RomCom, and is "being exploited in the wild in the guise of job application documents."

For those of us who struggle to understand the mechanisms behind these attacks (I'm with you, this stuff is often complicated), Bleeping Computer has a good breakdown. Essentially, an infected archive, once delivered to a host machine, can extract executables into Windows autorun paths—including the Startup folder.

WD_Black SN7100 SSD
Best SSD for gaming 2025

👉Check out our full guide👈

1. Best overall:
WD_Black SN7100

2. Best budget:
Biwin Black Opal NV7400

3. Best PCIe 5.0:
WD_Black SN8100

4. Best budget PCIe 5.0:
Crucial P510

5. Best 4 TB:
TeamGroup MP44

6. Best 8 TB:
WD_Black SN850X

7. Best M.2 2230:
Lexar Play 2230

8. Best for PS5:
Silicon Power XS70

9. Best SATA:
Crucial MX500

Andy Edser
Hardware Writer

Andy built his first gaming PC at the tender age of 12, when IDE cables were a thing and high resolution wasn't—and he hasn't stopped since. Now working as a hardware writer for PC Gamer, Andy spends his time jumping around the world attending product launches and trade shows, all the while reviewing every bit of PC gaming hardware he can get his hands on. You name it, if it's interesting hardware he'll write words about it, with opinions and everything.

You must confirm your public display name before commenting

Please logout and then login again, you will then be prompted to enter your display name.