Логотип exploitDog
bind:CVE-2025-47934
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2025-47934

Количество 4

Количество 4

nvd логотип

CVE-2025-47934

9 месяцев назад

OpenPGP.js is a JavaScript implementation of the OpenPGP protocol. Startinf in version 5.0.1 and prior to versions 5.11.3 and 6.1.1, a maliciously modified message can be passed to either `openpgp.verify` or `openpgp.decrypt`, causing these functions to return a valid signature verification result while returning data that was not actually signed. This flaw allows signature verifications of inline (non-detached) signed messages (using `openpgp.verify`) and signed-and-encrypted messages (using `openpgp.decrypt` with `verificationKeys`) to be spoofed, since both functions return extracted data that may not match the data that was originally signed. Detached signature verifications are not affected, as no signed data is returned in that case. In order to spoof a message, the attacker needs a single valid message signature (inline or detached) as well as the plaintext data that was legitimately signed, and can then construct an inline-signed message or signed-and-encrypted message with any

EPSS: Низкий
debian логотип

CVE-2025-47934

9 месяцев назад

OpenPGP.js is a JavaScript implementation of the OpenPGP protocol. Sta ...

EPSS: Низкий
github логотип

GHSA-8qff-qr5q-5pr8

9 месяцев назад

OpenPGP.js's message signature verification can be spoofed

EPSS: Низкий
fstec логотип

BDU:2026-00782

9 месяцев назад

Уязвимость функций verify() и decrypt() npm библиотеки OpenPGP, позволяющая нарушителю получить действительную подпись сообщения и раскрыть защищаемую информацию

CVSS3: 7.5
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2025-47934

OpenPGP.js is a JavaScript implementation of the OpenPGP protocol. Startinf in version 5.0.1 and prior to versions 5.11.3 and 6.1.1, a maliciously modified message can be passed to either `openpgp.verify` or `openpgp.decrypt`, causing these functions to return a valid signature verification result while returning data that was not actually signed. This flaw allows signature verifications of inline (non-detached) signed messages (using `openpgp.verify`) and signed-and-encrypted messages (using `openpgp.decrypt` with `verificationKeys`) to be spoofed, since both functions return extracted data that may not match the data that was originally signed. Detached signature verifications are not affected, as no signed data is returned in that case. In order to spoof a message, the attacker needs a single valid message signature (inline or detached) as well as the plaintext data that was legitimately signed, and can then construct an inline-signed message or signed-and-encrypted message with any

0%
Низкий
9 месяцев назад
debian логотип
CVE-2025-47934

OpenPGP.js is a JavaScript implementation of the OpenPGP protocol. Sta ...

0%
Низкий
9 месяцев назад
github логотип
GHSA-8qff-qr5q-5pr8

OpenPGP.js's message signature verification can be spoofed

0%
Низкий
9 месяцев назад
fstec логотип
BDU:2026-00782

Уязвимость функций verify() и decrypt() npm библиотеки OpenPGP, позволяющая нарушителю получить действительную подпись сообщения и раскрыть защищаемую информацию

CVSS3: 7.5
0%
Низкий
9 месяцев назад

Уязвимостей на страницу