I have a zip file containing an unencrypted folder with encrypted files inside.
Given that for some files I have their originals, is it possible to restore the password used for encryption?
Recovering the AES key in the situation you describe is called a known-plaintext attack. In the brute force approach, one tries all possible keys to see which one decrypts the ciphertext to the (already known) plain text. On average, one would try about half the keys before success, or 2255 tries. That is effectively impossible because of the time it would take.
There are some shortcut attacks that reduce the number of attempts, but not to a level that is practical. There is more information here: https://math.stackexchange.com/a/57428 but the answer is still no.
However, your question asks about the password, not the key. If I were in your situation, I think I'd try to automate entering the password, then apply a list of 10,000 or so most common passwords. (Such lists are easy to find with Google.) If you have to do it by hand, try the 100 most common first.
Edit: I note that the 7zip program has a command-line interface. I haven't researched this thoroughly, but I did look far enough to see that you can extract password-protected files and that the program sets a return code. The GUI version gives an "invalid password" message when a wrong password is used, so I think this might be a reasonable way to attack your problem, and you don't even need the plaintext. (Not sure how 7zip determines that a password is "invalid.")