Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Critical OpenPGP.js Vulnerability Allows Spoofing

Posted on May 21, 2025May 21, 2025 By CWS

The builders of OpenPGP.js have launched updates to patch a important vulnerability that may be exploited to spoof message signature verification.

OpenPGP.js is an open supply JavaScript implementation of the OpenPGP e mail encryption library, enabling its use on any system. In line with its builders, “The thought is to implement all of the wanted OpenPGP performance in a JavaScript library that may be reused in different initiatives that present browser extensions or server purposes.”

Its web site reveals that OpenPGP.js is utilized by initiatives akin to FlowCrypt, Mymail-Crypt, UDC, Encrypt.to, PGP Wherever, and Passbolt.

Researchers Edoardo Geraci and Thomas Rinsma of Codean Labs found lately that OpenPGP.js is affected by a important vulnerability.

The flaw permits an attacker to spoof signature verification utilizing a specifically crafted message handed to the ‘openpgp.confirm’ or ‘openpgp.decrypt’ features, inflicting them to “return a sound signature verification outcome whereas returning information that was not really signed”.

“As a way to spoof a message, the attacker wants a single legitimate message signature (inline or indifferent) in addition to the plaintext information that was legitimately signed, and might then assemble an inline-signed message or signed-and-encrypted message with any information of the attacker’s selection, which is able to seem as legitimately signed by affected variations of OpenPGP.js,” the researchers defined.

“In different phrases, any inline-signed message will be modified to return some other information (whereas nonetheless indicating that the signature was legitimate), and the identical is true for signed+encrypted messages if the attacker can get hold of a sound signature and encrypt a brand new message (of the attacker’s selection) along with that signature,” they added.

Tracked as CVE-2025-47934, the difficulty impacts OpenPGP.js variations 5 and 6, and it has been patched with the discharge of variations 5.11.3 and 6.1.1. Workarounds are additionally obtainable.Commercial. Scroll to proceed studying.

Associated: Cisco Confirms Some Merchandise Impacted by Crucial Erlang/OTP Flaw

Associated: Vulnerabilities in MongoDB Library Permit RCE on Node.js Servers

Associated: Solana Web3.js Library Backdoored in Provide Chain Assault

Associated: Crucial Commvault Vulnerability in Attacker Crosshairs

Security Week News Tags:Critical, OpenPGP.js, Spoofing, Vulnerability

Post navigation

Previous Post: Google Chrome Can Now Auto-Change Compromised Passwords Using Its Built-In Manager
Next Post: Ransomware Attack Forces Kettering Health to Cancel Procedures

Related Posts

Hackers Win $260,000 on First Day of Pwn2Own Berlin 2025 Security Week News
Cityworks Zero-Day Exploited by Chinese Hackers in US Local Government Attacks Security Week News
Fog Ransomware Attack Employs Unusual Tools Security Week News
With Retail Cyberattacks on the Rise, Customers Find Orders Blocked and Shelves Empty Security Week News
Microsoft to Lay Off About 3% of Its Workforce Security Week News
Patrick Ware Named Executive Director of US Cyber Command Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • How to Identify Fake Mobile Apps
  • “CitrixBleed 2” Vulnerability PoC Released
  • Russia Jailed Hacker Who Worked for Ukrainian Intelligence to Launch Cyberattacks on Critical Infrastructure
  • Threat Actors Turning Job Offers Into Traps, Over $264 Million Lost in 2024 Alone
  • Instagram Started Using 1-Week Validity TLS certificates and Changes Them Daily

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • How to Identify Fake Mobile Apps
  • “CitrixBleed 2” Vulnerability PoC Released
  • Russia Jailed Hacker Who Worked for Ukrainian Intelligence to Launch Cyberattacks on Critical Infrastructure
  • Threat Actors Turning Job Offers Into Traps, Over $264 Million Lost in 2024 Alone
  • Instagram Started Using 1-Week Validity TLS certificates and Changes Them Daily

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News