Cybersecurity Forecast 2026: What to Expect – New Report

CVE-2025-0411

Mark-of-the-Web Bypass in 7-Zip Enables Code Execution: CVE-2025-0411 Explained

Vulnerability Overview

CVE ID: CVE-2025-0411

CVE Title: 7Zip MarkoftheWeb Bypass

Severity: High

Exploit Status: Actively exploited; multiple public PoCs

Business Risk: High risk of userlevel code execution, malware delivery, and security control bypass leading to compromise of systems relying on MoTW protections.

Compliance Impact: Potential exposure of data and weakening of fileorigin safeguards, increasing the likelihood of policy violations where filehandling and workstation security controls are mandated.

Summary

CVE20250411 is a highseverity vulnerability in 7Zip where files extracted from crafted archives fail to inherit the Windows MarkoftheWeb (MoTW), allowing attackers to bypass security prompts and execute code with user privileges. Affecting versions prior to 24.09, it has been actively exploited in the wild, with public proofofconcepts available, and is listed in the CISA Known Exploited Vulnerabilities catalog. Updating to 7Zip 24.09 or later mitigates the risk.

Urgent Actions Required

Which Systems Are Vulnerable to CVE-2025-0411?

Technical Overview

How Does the CVE-2025-0411 Exploit Work?

The attack typically follows these steps:

How Does the CVE-2025-0411 Exploit Work?

What Causes CVE-2025-0411?

Vulnerability Root Cause:

The flaw comes from how 7Zip handles archives with a MarkoftheWeb flag. When a crafted archive is extracted, 7Zip does not pass the MoTW flag to the extracted files. Because the extracted files lose this security marker, Windows cannot apply its usual protections. This lapse in MoTW propagation creates an opportunity for attackers to deliver files that appear safe but can run without the restrictions normally placed on content from untrusted sources.

How Can You Mitigate CVE-2025-0411?

If immediate patching is delayed or not possible:

  • Only open archives from trusted sources.
  • Scan or sandbox suspicious files.
  • Keep antivirus and endpoint protection updated.
  • Warn users to avoid unknown files.

Which Assets and Systems Are at Risk?

Asset Types Affected:

Business-Critical Systems at Risk:

Exposure Level:

Will Patching CVE-2025-0411 Cause Downtime?

Patch application impact: Updating to 7-Zip 24.09 generally causes minimal disruption, as the fix only requires installing the updated version. Most environments can apply the update quickly with little or no downtime.

How Can You Detect CVE-2025-0411 Exploitation?

Alerting Strategy:

Remediation & Response

Remediation Timeline:

Incident Response Considerations:

Compliance & Governance Notes

CVSS Breakdown Table

MetricValue Description
Base Score7.0The vector indicates highimpact consequences across confidentiality, integrity, and availability
Attack VectorLocalExploitation requires local system access; cannot be triggered over the network
Attack ComplexityHighThe attack requires specific conditions or preparation, making exploitation more difficult
Privileges RequiredNoneNo elevated permissions are needed to trigger the vulnerability
User Interaction RequiredThe vulnerable action depends on the user, such as opening or interacting with a crafted file
Scope UnChanged The impact is confined to the affected component and does not extend to other system components
Confidentiality Impact HighSuccessful exploitation can expose sensitive information
Integrity ImpactHighThe flaw can allow unauthorized modification of data
Availability ImpactHighExploitation can significantly disrupt or damage system availability

Related Readings

One Platform for All Adversaries

See Fidelis in action. Learn how our fast and scalable platforms provide full visibility, deep insights, and rapid response to help security teams across the World protect, detect, respond, and neutralize advanced cyber adversaries.