CVE-2025-52331

Source
https://cve.org/CVERecord?id=CVE-2025-52331
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-52331.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2025-52331
Downstream
Published
2025-11-12T17:15:37.733Z
Modified
2026-03-13T22:21:29.114282Z
Severity
  • 6.1 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N CVSS Calculator
Summary
[none]
Details

Cross-site scripting (XSS) vulnerability in the generate report functionality in Rarlab WinRAR 7.11, allows attackers to disclose user information such as the computer username, generated report directory, and IP address. The generate report command includes archived file names without validation in the HTML report, which allows potentially malicious HTML tags to be injected into the report. User interaction is required. User must use the "generate report" functionality and open the report.

References

Affected packages

Git /

Affected ranges

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-52331.json"
unresolved_ranges
[
    {
        "events": [
            {
                "introduced": "0"
            },
            {
                "last_affected": "7.11-NA"
            }
        ]
    }
]