In Bandisoft Bandizip through 7.37, there is a Mark-of-the-Web Bypass Vulnerability. This vulnerability allows attackers to bypass the Mark-of-the-Web protection mechanism on affected installations of Bandizip. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of archived files. When extracting files from a crafted archive that bears the Mark-of-the-Web, Bandizip does not propagate the Mark-of-the-Web to the extracted files. An attacker can leverage this vulnerability to execute arbitrary code in the context of the current user.
References
Link | Resource |
---|---|
https://en.bandisoft.com/bandizip/ | Product |
https://github.com/EnisAksu/Argonis/blob/main/CVEs/CVE-2025-33027%20%28Bandizip%29/CVE-2025-33027.md | Third Party Advisory |
https://github.com/EnisAksu/Argonis/blob/main/CVEs/CVE-2025-33027%20%28Bandizip%29/CVE-2025-33027.md | Third Party Advisory |
Configurations
History
25 Apr 2025, 16:54
Type | Values Removed | Values Added |
---|---|---|
References | () https://en.bandisoft.com/bandizip/ - Product | |
References | () https://github.com/EnisAksu/Argonis/blob/main/CVEs/CVE-2025-33027%20%28Bandizip%29/CVE-2025-33027.md - Third Party Advisory | |
CPE | cpe:2.3:a:bandisoft:bandizip:*:*:*:*:*:*:*:* | |
CWE | CWE-829 | |
First Time |
Bandisoft bandizip
Bandisoft |
|
Summary |
|
15 Apr 2025, 18:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-04-15 18:15
Updated : 2025-04-25 16:54
NVD link : CVE-2025-33027
Mitre link : CVE-2025-33027
CVE.ORG link : CVE-2025-33027
JSON object : View
Products Affected
bandisoft
- bandizip