CVE-2025-46652

In IZArc through 4.5, there is a Mark-of-the-Web Bypass Vulnerability. When a user performs an extraction from an archive file that bears Mark-of-the-Web, Mark-of-the-Web is not propagated to the extracted files. NOTE: this is disputed because Mark-of-the-Web propagation can increase risk via security-warning habituation, and because the intended control sphere for file-origin metadata (e.g., HostUrl in Zone.Identifier) may be narrower than that for reading the file's content.
Configurations

No configuration.

History

24 Oct 2025, 20:16

Type Values Removed Values Added
Summary (en) In IZArc through 4.5, there is a Mark-of-the-Web Bypass Vulnerability. When a user performs an extraction from an archive file that bears Mark-of-the-Web, Mark-of-the-Web is not propagated to the extracted files. (en) In IZArc through 4.5, there is a Mark-of-the-Web Bypass Vulnerability. When a user performs an extraction from an archive file that bears Mark-of-the-Web, Mark-of-the-Web is not propagated to the extracted files. NOTE: this is disputed because Mark-of-the-Web propagation can increase risk via security-warning habituation, and because the intended control sphere for file-origin metadata (e.g., HostUrl in Zone.Identifier) may be narrower than that for reading the file's content.

29 Apr 2025, 13:52

Type Values Removed Values Added
Summary
  • (es) En IZArc hasta la versión 4.5, existe una vulnerabilidad de omisión de la marca de la web. Cuando un usuario realiza una extracción de un archivo comprimido con la marca de la web, esta no se propaga a los archivos extraídos.

26 Apr 2025, 18:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-04-26 18:15

Updated : 2025-10-24 20:16


NVD link : CVE-2025-46652

Mitre link : CVE-2025-46652

CVE.ORG link : CVE-2025-46652


JSON object : View

Products Affected

No product.

CWE
CWE-830

Inclusion of Web Functionality from an Untrusted Source