Information Security 4 min read

7-Zip Vulnerability CVE-2022-29072: Exploit Details and Temporary Mitigation

A security researcher discovered that 7‑Zip (including version 21.07) contains CVE‑2022‑29072, a vulnerability that can be triggered by dragging a .7z file onto the Help → Content area, leading to privilege escalation and arbitrary command execution, with a temporary fix of deleting the vulnerable 7‑zip.chm file.

IT Services Circle
IT Services Circle
IT Services Circle
7-Zip Vulnerability CVE-2022-29072: Exploit Details and Temporary Mitigation

7‑Zip is an open‑source compression tool primarily for Microsoft Windows, and a Linux version was released in March of last year.

Researcher Kağan Çapar recently discovered a vulnerability in 7‑Zip (CVE‑2022‑29072) that may allow attackers to gain higher privileges and execute arbitrary commands; the flaw affects all versions, including the latest 21.07.

The exploit is simple: dragging a file with the .7z extension onto the 7‑Zip window's Help → Content area triggers the issue (see GIF).

The vulnerability stems from a misconfiguration and stack overflow in 7z.dll; after installation, files in the Help → Content area are processed by Windows HTML Helper, and command injection creates a child process under 7zFM.exe, which interacts with 7z.dll memory, causing the spawned cmd.exe to run with administrator rights.

The developers have not yet released a patch, and the last update was in December 2021.

Temporary solution: delete the vulnerable 7-zip.chm file located in the installation folder (e.g., C:\Programs\ ).

7-zip.chm is a help file; removing it does not affect core functionality, but the Help → Content menu or F1 will no longer open the help.

To delete the file, open the program’s folder (commonly C:\Programs\ ), locate the 7-zip.chm file, and delete it, or revoke write permissions for the 7‑Zip program.

Information Securityvulnerability7-ZipCVE-2022-29072Temporary Fix
IT Services Circle
Written by

IT Services Circle

Delivering cutting-edge internet insights and practical learning resources. We're a passionate and principled IT media platform.

0 followers
Reader feedback

How this landed with the community

login Sign in to like

Rate this article

Was this worth your time?

Sign in to rate
Discussion

0 Comments

Thoughtful readers leave field notes, pushback, and hard-won operational detail here.