Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Critical OpenPGP.js Vulnerability Allows Spoofing

Critical OpenPGP.js Vulnerability Allows Spoofing

Posted on May 21, 2025May 21, 2025 By CWS

The builders of OpenPGP.js have launched updates to patch a important vulnerability that may be exploited to spoof message signature verification.

OpenPGP.js is an open supply JavaScript implementation of the OpenPGP e mail encryption library, enabling its use on any system. In line with its builders, “The thought is to implement all of the wanted OpenPGP performance in a JavaScript library that may be reused in different initiatives that present browser extensions or server purposes.”

Its web site reveals that OpenPGP.js is utilized by initiatives akin to FlowCrypt, Mymail-Crypt, UDC, Encrypt.to, PGP Wherever, and Passbolt.

Researchers Edoardo Geraci and Thomas Rinsma of Codean Labs found lately that OpenPGP.js is affected by a important vulnerability.

The flaw permits an attacker to spoof signature verification utilizing a specifically crafted message handed to the ‘openpgp.confirm’ or ‘openpgp.decrypt’ features, inflicting them to “return a sound signature verification outcome whereas returning information that was not really signed”.

“As a way to spoof a message, the attacker wants a single legitimate message signature (inline or indifferent) in addition to the plaintext information that was legitimately signed, and might then assemble an inline-signed message or signed-and-encrypted message with any information of the attacker’s selection, which is able to seem as legitimately signed by affected variations of OpenPGP.js,” the researchers defined.

“In different phrases, any inline-signed message will be modified to return some other information (whereas nonetheless indicating that the signature was legitimate), and the identical is true for signed+encrypted messages if the attacker can get hold of a sound signature and encrypt a brand new message (of the attacker’s selection) along with that signature,” they added.

Tracked as CVE-2025-47934, the difficulty impacts OpenPGP.js variations 5 and 6, and it has been patched with the discharge of variations 5.11.3 and 6.1.1. Workarounds are additionally obtainable.Commercial. Scroll to proceed studying.

Associated: Cisco Confirms Some Merchandise Impacted by Crucial Erlang/OTP Flaw

Associated: Vulnerabilities in MongoDB Library Permit RCE on Node.js Servers

Associated: Solana Web3.js Library Backdoored in Provide Chain Assault

Associated: Crucial Commvault Vulnerability in Attacker Crosshairs

Security Week News Tags:Critical, OpenPGP.js, Spoofing, Vulnerability

Post navigation

Previous Post: Google Chrome Can Now Auto-Change Compromised Passwords Using Its Built-In Manager
Next Post: Ransomware Attack Forces Kettering Health to Cancel Procedures

Related Posts

Is AI Use in the Workplace Out of Control? Is AI Use in the Workplace Out of Control? Security Week News
High-Severity Vulnerabilities Patched in Tenable Nessus Agent High-Severity Vulnerabilities Patched in Tenable Nessus Agent Security Week News
Trustifi Raises  Million for AI-Powered Email Security Trustifi Raises $25 Million for AI-Powered Email Security Security Week News
200,000 Harbin Clinic Patients Impacted by NRS Data Breach 200,000 Harbin Clinic Patients Impacted by NRS Data Breach Security Week News
Amazon Detects 150,000 NPM Packages in Worm-Powered Campaign  Amazon Detects 150,000 NPM Packages in Worm-Powered Campaign  Security Week News
Linux Security: New Flaws Allow Root Access, CISA Warns of Old Bug Exploitation Linux Security: New Flaws Allow Root Access, CISA Warns of Old Bug Exploitation Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News