• delivr.to Feed
High Severity

Attachment: Archive with Directory Traversal CVE-2025-6218 (Unsolicited)

Labels

No labels.

Description

An archive file (RAR or ZIP) that includes evidence of a directory traversal that could be used to exploit CVE-2025-6218, a vulnerability in WinRAR prior to version 7.12.

@delivr_to
Created Jul 23rd, 2025 • Last updated Jul 23rd, 2025
Feed Source
delivr.to Feed
Source
type.inbound
and any(attachments,
    .file_extension in $file_extensions_common_archives
    and any(file.explode(.),
        any(.scan.zip.attempted_files, 
            regex.icontains(., '(\.\.\s\.\\){1,}')
        ) or 
        any(.scan.yara.matches, 
            .name == "SUSP_archive_CVE_2025_6218_Jul25"
        )
    )
)
and (
    (
        // unsolicited
        not profile.by_sender_email().solicited
        // negate highly trusted sender domains unless they fail DMARC authentication
        and (
            (
                sender.email.domain.root_domain in $high_trust_sender_root_domains
                and (
                    any(distinct(headers.hops, .authentication_results.dmarc is not null),
                        strings.ilike(.authentication_results.dmarc, "*fail")
                    )
                )
            )
            or sender.email.domain.root_domain not in $high_trust_sender_root_domains
        )
    )
    or sender.email.domain.domain == "delivrto.me"
)
MQL Rule Console
DocsLearning Labs

Playground

Test against your own EMLs or sample data.

Share

Post about this on your socials.

Get Started. Today.

Managed or self-managed. No MX changes.

Deploy and integrate a free Sublime instance in minutes.
Get Started