VYPR
Unrated severityNVD Advisory· Published Sep 7, 2012· Updated Apr 29, 2026

CVE-2010-5274

CVE-2010-5274

Description

Untrusted search path vulnerability in PKZIP before 12.50.0014 allows local users to gain privileges via a Trojan horse dwmapi.dll file in the current working directory, as demonstrated by a directory that contains a .zip file. NOTE: some of these details are obtained from third party information.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

PKZIP before 12.50.0014 contains an untrusted search path flaw allowing local privilege escalation via a malicious dwmapi.dll in the working directory.

Vulnerability

PKZIP versions prior to 12.50.0014 (v12 Maintenance Release 5) contain an untrusted search path vulnerability. The application loads the dwmapi.dll library from the current working directory instead of a secure system path. This affects all users of PKZIP for Desktop v12.2 and later, as well as SecureZIP for Desktop versions. The flaw is triggered when a user opens a .zip file from a directory containing a malicious DLL [1].

Exploitation

An attacker with the ability to place a malicious dwmapi.dll file in a directory (e.g., via a download or removable media) can exploit this by convincing a target user to open a .zip file from that location. The attacker does not require elevated privileges; only local user access and the ability to write files to the target directory are needed. When PKZIP launches and processes the archive, it loads the attacker-controlled DLL instead of the legitimate system library, executing arbitrary code in the context of the user [1].

Impact

Successful exploitation allows the attacker to achieve arbitrary code execution under the privileges of the logged-on user. This can lead to full system compromise, data exfiltration, or installation of persistent malware. The vulnerability is locally exploitable but does not require administrative rights to trigger [1].

Mitigation

The vulnerability is fixed in PKZIP version 12.50.0014 (v12 Maintenance Release 5), available from the vendor's support portal. Users on version 12.2 or later should apply this update. For older versions (9.x or earlier), a new license key is required. The vulnerability is not listed on the CISA KEV as of 2024-07-06. No workaround is documented other than upgrading [1].

AI Insight generated on May 23, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1
  • cpe:2.3:a:pkware:pkzip:12.50.0014:*:*:*:*:*:*:*

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

2

News mentions

0

No linked articles in our index yet.