Advisory Database
  • Advisories
  • Dependency Scanning
  1. npm
  2. ›
  3. openpgp
  4. ›
  5. CVE-2025-47934

CVE-2025-47934: OpenPGP.js's message signature verification can be spoofed

May 19, 2025

A maliciously modified message can be passed to either openpgp.verify or openpgp.decrypt, causing these functions to return a valid signature verification result while returning data that was not actually signed.

This flaw allows signature verifications of inline (non-detached) signed messages (using openpgp.verify) and signed-and-encrypted messages (using openpgp.decrypt with verificationKeys) to be spoofed, since both functions return extracted data that may not match the data that was originally signed. Detached signature verifications are not affected, as no signed data is returned in that case.

In order to spoof a message, the attacker needs a single valid message signature (inline or detached) as well as the plaintext data that was legitimately signed, and can then construct an inline-signed message or signed-and-encrypted message with any data of the attacker’s choice, which will appear as legitimately signed by affected versions of OpenPGP.js.

In other words. any inline-signed message can be modified to return any other data (while still indicating that the signature was valid), and the same is true for signed+encrypted messages if the attacker can obtain a valid signature and encrypt a new message (of the attacker’s choice) together with that signature.

Both OpenPGP.js v6 and v5 are affected. OpenPGP.js v4 is not affected.

References

  • github.com/advisories/GHSA-8qff-qr5q-5pr8
  • github.com/openpgpjs/openpgpjs
  • github.com/openpgpjs/openpgpjs/commit/43f5f4e2bd67d0514d06acc60b6ee571a049c229
  • github.com/openpgpjs/openpgpjs/commit/843a69d0adbdec0f87af09f9000a9223e6614e5c
  • github.com/openpgpjs/openpgpjs/commit/bd54e8535ca29b3bef58a8c02296892e408be356
  • github.com/openpgpjs/openpgpjs/releases/tag/v5.11.3
  • github.com/openpgpjs/openpgpjs/releases/tag/v6.1.1
  • github.com/openpgpjs/openpgpjs/security/advisories/GHSA-8qff-qr5q-5pr8
  • nvd.nist.gov/vuln/detail/CVE-2025-47934

Code Behaviors & Features

Detect and mitigate CVE-2025-47934 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions starting from 5.0.1 before 5.11.3, all versions starting from 6.0.0-alpha.0 before 6.1.1

Fixed versions

  • 5.11.3
  • 6.1.1

Solution

Upgrade to versions 5.11.3, 6.1.1 or above.

Weakness

  • CWE-347: Improper Verification of Cryptographic Signature

Source file

npm/openpgp/CVE-2025-47934.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Tue, 19 Aug 2025 12:19:09 +0000.