Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
OpenPGP.js Vulnerability Let Attackers Spoof Message Signature Verification

OpenPGP.js Vulnerability Let Attackers Spoof Message Signature Verification

Posted on June 12, 2025June 12, 2025 By CWS

A vital vulnerability within the widely-used OpenPGP.js library has been found that enables attackers to forge digital signatures and deceive customers into believing malicious content material was legitimately signed by trusted sources.

The flaw, designated CVE-2025-47934, represents a elementary breach of cryptographic belief that might undermine safe communications throughout quite a few web-based purposes and electronic mail shoppers that depend on the favored JavaScript implementation of the OpenPGP customary.

The vulnerability impacts OpenPGP.js variations previous to v5.11.3 and v6.1.1, probably impacting hundreds of thousands of customers who rely on encrypted electronic mail providers and different purposes using the library for safe communications.

Notable affected platforms embrace Mailvelope and probably different web-based electronic mail shoppers, although Proton Mail was confirmed to be unaffected by this particular concern.

The severity of this vulnerability stems from its capability to utterly subvert the core precept of digital signature verification, permitting attackers to current arbitrary malicious content material whereas sustaining the looks of a legitimate cryptographic signature from a reputable supply.

Codean Labs researchers recognized this vulnerability by way of their safety analysis program, demonstrating how an attacker with entry to any legitimate signature from a goal person might manipulate the verification course of to authenticate utterly completely different content material.

The analysis crew efficiently demonstrated the assault by displaying how a reputable signature on the phrase “reputable” may very well be manipulated to look as a legitimate signature on the phrase “malicious” whereas sustaining cryptographic verification success.

The invention has prompted instant motion from the OpenPGP.js growth crew, who launched patches addressing the vulnerability and implementing stricter grammar verification to stop comparable assaults sooner or later.

The coordinated disclosure course of started in early Might 2025, with fixes and advisories printed inside two weeks of acknowledgment by the maintainers.

Technical Exploitation Mechanism

The vulnerability exploits a vital flaw in how OpenPGP.js processes packet lists throughout message verification.

The assault leverages the library’s versatile dealing with of compressed and uncompressed information packets, making a state of affairs the place signature verification and information extraction function on completely different packet sequences throughout the similar message.

An attacker constructs a malformed packet listing by taking a reputable signed message and appending a malicious Compressed Knowledge packet containing arbitrary content material.

The ensuing construction consists of the unique One-Go Signature packet, Literal Knowledge packet with reputable content material, a legitimate Signature packet, adopted by the attacker-controlled Compressed Knowledge packet containing malicious payload.

Throughout the verification course of, OpenPGP.js first reads packets till it encounters a streamable packet kind, initially processing solely the reputable signed content material.

The unwrapCompressed() methodology examines this restricted packet listing and finds no compressed information, so it verifies the signature in opposition to the reputable content material efficiently.

Nonetheless, when the library subsequently retrieves the message information for return to the person, it re-examines the now-complete packet listing and extracts content material from the primary Compressed Knowledge packet it encounters, which incorporates the attacker’s malicious payload.

const verificationResult = await openpgp.confirm({ message, verificationKeys: publicKey });
console.log(`Signed message information: ${verificationResult.information}`); // Returns malicious content material
const { verified } = verificationResult.signatures[0];
await verified; // Signature verification succeeds

This timing discrepancy in packet processing creates a harmful disconnect between what content material is cryptographically verified and what content material is offered to the person, essentially breaking the safety assure that digital signatures are supposed to supply.

Automate menace response with ANY.RUN’s TI Feeds—Enrich alerts and block malicious IPs throughout all endpoints -> Request full entry

Cyber Security News Tags:Attackers, Message, OpenPGP.js, Signature, Spoof, Verification, Vulnerability

Post navigation

Previous Post: Palo Alto Networks PAN-OS Vulnerability Enables Admin to Execute Root User Actions
Next Post: Threat Actors Leverages DeepSeek-R1 Popularity to Attack Users Running Windows Devices

Related Posts

Critical Apache Tika PDF Parser Vulnerability Allow Attackers to Access Sensitive Data Critical Apache Tika PDF Parser Vulnerability Allow Attackers to Access Sensitive Data Cyber Security News
Dohdoor Malware Targets U.S. Schools and Healthcare Dohdoor Malware Targets U.S. Schools and Healthcare Cyber Security News
DinDoor Backdoor Exploits Deno and MSI for Stealth Attacks DinDoor Backdoor Exploits Deno and MSI for Stealth Attacks Cyber Security News
New EncryptHub Campaign Leverages Brave Support Platform to Deliver Malicious Payloads via MMC Vulnerability New EncryptHub Campaign Leverages Brave Support Platform to Deliver Malicious Payloads via MMC Vulnerability Cyber Security News
Microsoft Halts Key Open-Source Project Developer Accounts Microsoft Halts Key Open-Source Project Developer Accounts Cyber Security News
Malware Campaign Exploits SEO to Target IT Professionals Malware Campaign Exploits SEO to Target IT Professionals Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Vulnerability in PraisonAI Exploited Within Hours
  • Langflow Vulnerability Exploited for AWS Key Theft
  • VMware Fusion Vulnerability Receives Critical Update
  • Critical Vulnerability in MongoDB Risks Data Exposure
  • Windows Zero-Day Exploits: YellowKey and GreenPlasma Revealed

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Vulnerability in PraisonAI Exploited Within Hours
  • Langflow Vulnerability Exploited for AWS Key Theft
  • VMware Fusion Vulnerability Receives Critical Update
  • Critical Vulnerability in MongoDB Risks Data Exposure
  • Windows Zero-Day Exploits: YellowKey and GreenPlasma Revealed

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark