Skip to main content

DoomLauncher Directory Traversal Remote Code Execution Vulnerability

← Back to Advisories
CVE Number CVE-2025-66687
Vendor DoomLauncher
Credit straw0454, JSec

Description

A Path Traversal vulnerability exists in Doom Launcher version 3.8.1.0 due to missing file path validation during the extraction of game files. Exploiting this flaw requires user interaction specifically, a user must load a maliciously crafted RAR file. If successful, an attacker can execute arbitrary code within the context of the current user's permissions.

Details

The vulnerability resides within Doom Launcher’s game loading logic. During the RAR decompression process, the application fails to adequately filter file paths. This allows relative path patterns, such as ../, to be passed directly to the file system. This issue stems from a lack of path validation when using the SevenZipSharp library, coupled with a missing secondary verification layer at the application level.

An attacker can exploit this to plant malicious files in sensitive locations, such as the user’s Startup folder. Upon the next system reboot, the planted file will execute, leading to full arbitrary code execution.

The vendor has addressed this vulnerability in version 3.8.2.0 by implementing validation for relative paths during the game loading process.

Timeline

2025-11-18 - Vulnerability reported to Vendor

2026-03-09 - Vendor Patch Release

2026-03-13 - Public Release