{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2026-20538","assignerOrgId":"4a9b9929-2450-4021-b7b9-469a0255b215","state":"PUBLISHED","assignerShortName":"exampleCNA","dateReserved":"2025-07-23T15:35:47.170Z","datePublished":"2025-08-08T11:11:41.842Z","dateUpdated":"2026-02-26T17:49:47.133Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unknown","platforms":["Windows"],"product":"WinRAR","vendor":"win.rar GmbH","versions":[{"lessThanOrEqual":"7.12","status":"affected","version":"0","versionType":"custom"}]}],"descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"A path traversal vulnerability affecting the Windows version of WinRAR allows the attackers to execute arbitrary code by crafting malicious archive files."}],"value":"A path traversal vulnerability affecting the Windows version of WinRAR allows the attackers to execute arbitrary code by crafting malicious archive files."}],"metrics":[{"cvssV4_0":{"Automatable":"NOT_DEFINED","Recovery":"NOT_DEFINED","Safety":"NOT_DEFINED","attackComplexity":"LOW","attackRequirements":"NONE","attackVector":"LOCAL","baseScore":8.4,"baseSeverity":"HIGH","privilegesRequired":"NONE","providerUrgency":"NOT_DEFINED","subAvailabilityImpact":"NONE","subConfidentialityImpact":"NONE","subIntegrityImpact":"NONE","userInteraction":"ACTIVE","valueDensity":"NOT_DEFINED","vectorString":"CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N","version":"4.0","vulnAvailabilityImpact":"HIGH","vulnConfidentialityImpact":"HIGH","vulnIntegrityImpact":"HIGH","vulnerabilityResponseEffort":"NOT_DEFINED"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-35","description":"CWE-35 Path traversal","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"4a9b9929-2450-4021-b7b9-469a0255b215","shortName":"exampleCNA","dateUpdated":"2025-08-08T11:11:41.842Z"},"references":[{"url":"https://www.win-rar.com/singlenewsview.html?&L=0&tx_ttnews%5Btt_news%5D=283&cHash=a64b4a8f662d3639dec8d65f47bc93c5"}],"source":{"discovery":"UNKNOWN"},"title":"Path traversal vulnerability in WinRAR","x_generator":{"engine":"Vulnogram 0.2.0"}},"adp":[{"tags":["x_ On Behalf Of dtsearch.com domain owner"],"providerMetadata":{"orgId":"cf854a3a-2127-422b-91ae-364da2661108","shortName":"mitre-sadp-by-proxy-0001","dateUpdated":"2025-03-25T19:20:50.848Z"},"references":[{"url":"https://support.dtsearch.com/faq/dts0245.htm"}],"affected":[{"defaultStatus":"unaffected","product":"dtSearch","vendor":"dtSearch","versions":[{"lessThan":"2023.01","status":"affected","version":"0","versionType":"custom"}]}],"x_adpType":"supplier","title":"MITRE SADP proxy testing","x_generator":{"engine":"sadp-request-form 0.0.1"}}]}}