- There is a way to verify fake messages, as if they were legitimate
- The error affects multiple versions of OpenPGP.js
- A patch is available
A JavaScript security error implementation of OpenPGP.JS allows threat actors to verify false messages as if they were legitimate, which essentially breaks the public key creepography. These are, according to security researchers Edoardo Geraci and Thomas Rinsma of Codean Labs, who found and recently reported the vulnerability.
OpenPGP.JS is an open source JavaScript library that allows developers to encrypt, decrypt, sign and verify messages using the OpenPGP standard. Usually, when a user signs a message digitally, it ensures that the content was not manipulated.
But in this case, the vulnerability threatens the actor to change the message content while it still makes it seem like it had a valid signature.
Application of the patch
In theory, the vulnerability could be used, among other things, for a false payment permit. If a company used OpenPGP.JS to verify digitally signed payment requests from its clients, an attacker could get a valid signed request, change the payment information and send it back and effectively steal the money.
Versions 5.0.1 to 5.12.2 and 6.0.0-alpha.0 to 6.1.0 of OpenPGP.js was said to be vulnerable where the problem was patched in versions 5.11.3 and 6.1.1. Version 4 is sure it was added.
Those who cannot use the patch immediately must at least use the solution. Users can control signatures separately instead of just relying on the system’s verification or decrypt messages in two steps to ensure the data is not manipulated.
The error is now traced as CVE-2025-47934 and has a severity of 8.7/10 (high). There is currently no confirmed evidence of abuse in nature. A proof-of-concept (POC) and detailed analysis of the vulnerability is coming soon, said maintenance, likely to give users enough time to apply the patch.
Via Registered