Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Critical OpenPGP.js Vulnerability Allows Spoofing

Posted on May 21, 2025May 21, 2025 By CWS

The builders of OpenPGP.js have launched updates to patch a important vulnerability that may be exploited to spoof message signature verification.

OpenPGP.js is an open supply JavaScript implementation of the OpenPGP e mail encryption library, enabling its use on any system. In line with its builders, “The thought is to implement all of the wanted OpenPGP performance in a JavaScript library that may be reused in different initiatives that present browser extensions or server purposes.”

Its web site reveals that OpenPGP.js is utilized by initiatives akin to FlowCrypt, Mymail-Crypt, UDC, Encrypt.to, PGP Wherever, and Passbolt.

Researchers Edoardo Geraci and Thomas Rinsma of Codean Labs found lately that OpenPGP.js is affected by a important vulnerability.

The flaw permits an attacker to spoof signature verification utilizing a specifically crafted message handed to the ‘openpgp.confirm’ or ‘openpgp.decrypt’ features, inflicting them to “return a sound signature verification outcome whereas returning information that was not really signed”.

“As a way to spoof a message, the attacker wants a single legitimate message signature (inline or indifferent) in addition to the plaintext information that was legitimately signed, and might then assemble an inline-signed message or signed-and-encrypted message with any information of the attacker’s selection, which is able to seem as legitimately signed by affected variations of OpenPGP.js,” the researchers defined.

“In different phrases, any inline-signed message will be modified to return some other information (whereas nonetheless indicating that the signature was legitimate), and the identical is true for signed+encrypted messages if the attacker can get hold of a sound signature and encrypt a brand new message (of the attacker’s selection) along with that signature,” they added.

Tracked as CVE-2025-47934, the difficulty impacts OpenPGP.js variations 5 and 6, and it has been patched with the discharge of variations 5.11.3 and 6.1.1. Workarounds are additionally obtainable.Commercial. Scroll to proceed studying.

Associated: Cisco Confirms Some Merchandise Impacted by Crucial Erlang/OTP Flaw

Associated: Vulnerabilities in MongoDB Library Permit RCE on Node.js Servers

Associated: Solana Web3.js Library Backdoored in Provide Chain Assault

Associated: Crucial Commvault Vulnerability in Attacker Crosshairs

Security Week News Tags:Critical, OpenPGP.js, Spoofing, Vulnerability

Post navigation

Previous Post: Google Chrome Can Now Auto-Change Compromised Passwords Using Its Built-In Manager
Next Post: Ransomware Attack Forces Kettering Health to Cancel Procedures

Related Posts

Chipmaker Patch Tuesday: Intel, AMD, Arm Respond to New CPU Attacks Security Week News
GreyNoise Flags 9,000 ASUS Routers Backdoored Via Patched Vulnerability Security Week News
In Other News: Law Firm Hacked by China, Symantec Flaw, Meta AI Hack, FIDO Key Bypass Security Week News
US Announces $100 Million for State, Local and Tribal Cybersecurity Security Week News
Ray Security Emerges From Stealth With $11M to Bring Real-Time, AI-Driven Data Protection Security Week News
Carding Marketplace BidenCash Shut Down by Authorities  Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Microsoft Warns of Hackers Abuse Teams Features and Capabilities to Deliver Malware
  • Why Threat Prioritization Is the Key SOC Performance Driver  
  • BK Technologies Data Breach – Hackers Compromise IT Systems and Exfiltrate Data
  • BatShadow Group Uses New Go-Based ‘Vampire Bot’ Malware to Hunt Job Seekers
  • Google’s New AI Doesn’t Just Find Vulnerabilities — It Rewrites Code to Patch Them

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Microsoft Warns of Hackers Abuse Teams Features and Capabilities to Deliver Malware
  • Why Threat Prioritization Is the Key SOC Performance Driver  
  • BK Technologies Data Breach – Hackers Compromise IT Systems and Exfiltrate Data
  • BatShadow Group Uses New Go-Based ‘Vampire Bot’ Malware to Hunt Job Seekers
  • Google’s New AI Doesn’t Just Find Vulnerabilities — It Rewrites Code to Patch Them

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News