Количество 4
Количество 4
CVE-2025-47934
OpenPGP.js is a JavaScript implementation of the OpenPGP protocol. Startinf in version 5.0.1 and prior to versions 5.11.3 and 6.1.1, a maliciously modified message can be passed to either `openpgp.verify` or `openpgp.decrypt`, causing these functions to return a valid signature verification result while returning data that was not actually signed. This flaw allows signature verifications of inline (non-detached) signed messages (using `openpgp.verify`) and signed-and-encrypted messages (using `openpgp.decrypt` with `verificationKeys`) to be spoofed, since both functions return extracted data that may not match the data that was originally signed. Detached signature verifications are not affected, as no signed data is returned in that case. In order to spoof a message, the attacker needs a single valid message signature (inline or detached) as well as the plaintext data that was legitimately signed, and can then construct an inline-signed message or signed-and-encrypted message with any
CVE-2025-47934
OpenPGP.js is a JavaScript implementation of the OpenPGP protocol. Sta ...
GHSA-8qff-qr5q-5pr8
OpenPGP.js's message signature verification can be spoofed
BDU:2026-00782
Уязвимость функций verify() и decrypt() npm библиотеки OpenPGP, позволяющая нарушителю получить действительную подпись сообщения и раскрыть защищаемую информацию
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2025-47934 OpenPGP.js is a JavaScript implementation of the OpenPGP protocol. Startinf in version 5.0.1 and prior to versions 5.11.3 and 6.1.1, a maliciously modified message can be passed to either `openpgp.verify` or `openpgp.decrypt`, causing these functions to return a valid signature verification result while returning data that was not actually signed. This flaw allows signature verifications of inline (non-detached) signed messages (using `openpgp.verify`) and signed-and-encrypted messages (using `openpgp.decrypt` with `verificationKeys`) to be spoofed, since both functions return extracted data that may not match the data that was originally signed. Detached signature verifications are not affected, as no signed data is returned in that case. In order to spoof a message, the attacker needs a single valid message signature (inline or detached) as well as the plaintext data that was legitimately signed, and can then construct an inline-signed message or signed-and-encrypted message with any | 0% Низкий | 9 месяцев назад | ||
CVE-2025-47934 OpenPGP.js is a JavaScript implementation of the OpenPGP protocol. Sta ... | 0% Низкий | 9 месяцев назад | ||
GHSA-8qff-qr5q-5pr8 OpenPGP.js's message signature verification can be spoofed | 0% Низкий | 9 месяцев назад | ||
BDU:2026-00782 Уязвимость функций verify() и decrypt() npm библиотеки OpenPGP, позволяющая нарушителю получить действительную подпись сообщения и раскрыть защищаемую информацию | CVSS3: 7.5 | 0% Низкий | 9 месяцев назад |
Уязвимостей на страницу