VYPR
High severityNVD Advisory· Published May 19, 2025· Updated Apr 15, 2026

CVE-2025-47934

CVE-2025-47934

Description

OpenPGP.js is a JavaScript implementation of the OpenPGP protocol. Startinf in version 5.0.1 and prior to versions 5.11.3 and 6.1.1, a maliciously modified message can be passed to either openpgp.verify or openpgp.decrypt, causing these functions to return a valid signature verification result while returning data that was not actually signed. This flaw allows signature verifications of inline (non-detached) signed messages (using openpgp.verify) and signed-and-encrypted messages (using openpgp.decrypt with verificationKeys) to be spoofed, since both functions return extracted data that may not match the data that was originally signed. Detached signature verifications are not affected, as no signed data is returned in that case. In order to spoof a message, the attacker needs a single valid message signature (inline or detached) as well as the plaintext data that was legitimately signed, and can then construct an inline-signed message or signed-and-encrypted message with any data of the attacker's choice, which will appear as legitimately signed by affected versions of OpenPGP.js. In other words, any inline-signed message can be modified to return any other data (while still indicating that the signature was valid), and the same is true for signed+encrypted messages if the attacker can obtain a valid signature and encrypt a new message (of the attacker's choice) together with that signature. The issue has been patched in versions 5.11.3 and 6.1.1. Some workarounds are available. When verifying inline-signed messages, extract the message and signature(s) from the message returned by openpgp.readMessage, and verify the(/each) signature as a detached signature by passing the signature and a new message containing only the data (created using openpgp.createMessage) to openpgp.verify. When decrypting and verifying signed+encrypted messages, decrypt and verify the message in two steps, by first calling openpgp.decrypt without verificationKeys, and then passing the returned signature(s) and a new message containing the decrypted data (created using openpgp.createMessage) to openpgp.verify.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
openpgpnpm
>= 5.0.1, < 5.11.35.11.3
openpgpnpm
>= 6.0.0-alpha.0, < 6.1.16.1.1

Patches

5
43f5f4e2bd67

Don't mutate message during verification

https://github.com/openpgpjs/openpgpjsDaniel HuigensMay 9, 2025via ghsa
1 file changed · +7 6
  • src/message.js+7 6 modified
    @@ -604,12 +604,13 @@ export class Message {
         if (literalDataList.length !== 1) {
           throw new Error('Can only verify message with one literal data packet.');
         }
    -    if (stream.isArrayStream(msg.packets.stream)) {
    -      msg.packets.push(...await stream.readToEnd(msg.packets.stream, _ => _ || []));
    +    let packets = msg.packets;
    +    if (stream.isArrayStream(packets.stream)) {
    +      packets = packets.concat(await stream.readToEnd(packets.stream, _ => _ || []));
         }
    -    const onePassSigList = msg.packets.filterByTag(enums.packet.onePassSignature).reverse();
    -    const signatureList = msg.packets.filterByTag(enums.packet.signature);
    -    if (onePassSigList.length && !signatureList.length && util.isStream(msg.packets.stream) && !stream.isArrayStream(msg.packets.stream)) {
    +    const onePassSigList = packets.filterByTag(enums.packet.onePassSignature).reverse();
    +    const signatureList = packets.filterByTag(enums.packet.signature);
    +    if (onePassSigList.length && !signatureList.length && util.isStream(packets.stream) && !stream.isArrayStream(packets.stream)) {
           await Promise.all(onePassSigList.map(async onePassSig => {
             onePassSig.correspondingSig = new Promise((resolve, reject) => {
               onePassSig.correspondingSigResolve = resolve;
    @@ -619,7 +620,7 @@ export class Message {
             onePassSig.hashed = stream.readToEnd(await onePassSig.hash(onePassSig.signatureType, literalDataList[0], undefined, false));
             onePassSig.hashed.catch(() => {});
           }));
    -      msg.packets.stream = stream.transformPair(msg.packets.stream, async (readable, writable) => {
    +      packets.stream = stream.transformPair(packets.stream, async (readable, writable) => {
             const reader = stream.getReader(readable);
             const writer = stream.getWriter(writable);
             try {
    
bd54e8535ca2

Don't mutate message during verification

https://github.com/openpgpjs/openpgpjsDaniel HuigensMay 9, 2025via ghsa
1 file changed · +7 6
  • src/message.js+7 6 modified
    @@ -588,12 +588,13 @@ export class Message {
         if (literalDataList.length !== 1) {
           throw new Error('Can only verify message with one literal data packet.');
         }
    -    if (isArrayStream(msg.packets.stream)) {
    -      msg.packets.push(...await streamReadToEnd(msg.packets.stream, _ => _ || []));
    +    let packets = msg.packets;
    +    if (isArrayStream(packets.stream)) {
    +      packets = packets.concat(await streamReadToEnd(packets.stream, _ => _ || []));
         }
    -    const onePassSigList = msg.packets.filterByTag(enums.packet.onePassSignature).reverse();
    -    const signatureList = msg.packets.filterByTag(enums.packet.signature);
    -    if (onePassSigList.length && !signatureList.length && util.isStream(msg.packets.stream) && !isArrayStream(msg.packets.stream)) {
    +    const onePassSigList = packets.filterByTag(enums.packet.onePassSignature).reverse();
    +    const signatureList = packets.filterByTag(enums.packet.signature);
    +    if (onePassSigList.length && !signatureList.length && util.isStream(packets.stream) && !isArrayStream(packets.stream)) {
           await Promise.all(onePassSigList.map(async onePassSig => {
             onePassSig.correspondingSig = new Promise((resolve, reject) => {
               onePassSig.correspondingSigResolve = resolve;
    @@ -603,7 +604,7 @@ export class Message {
             onePassSig.hashed = streamReadToEnd(await onePassSig.hash(onePassSig.signatureType, literalDataList[0], undefined, false));
             onePassSig.hashed.catch(() => {});
           }));
    -      msg.packets.stream = streamTransformPair(msg.packets.stream, async (readable, writable) => {
    +      packets.stream = streamTransformPair(packets.stream, async (readable, writable) => {
             const reader = streamGetReader(readable);
             const writer = streamGetWriter(writable);
             try {
    
843a69d0adbd

Don't mutate message during verification

https://github.com/openpgpjs/openpgpjsDaniel HuigensMay 9, 2025via ghsa
1 file changed · +7 6
  • src/message.js+7 6 modified
    @@ -588,12 +588,13 @@ export class Message {
         if (literalDataList.length !== 1) {
           throw new Error('Can only verify message with one literal data packet.');
         }
    -    if (isArrayStream(msg.packets.stream)) {
    -      msg.packets.push(...await streamReadToEnd(msg.packets.stream, _ => _ || []));
    +    let packets = msg.packets;
    +    if (isArrayStream(packets.stream)) {
    +      packets = packets.concat(await streamReadToEnd(packets.stream, _ => _ || []));
         }
    -    const onePassSigList = msg.packets.filterByTag(enums.packet.onePassSignature).reverse();
    -    const signatureList = msg.packets.filterByTag(enums.packet.signature);
    -    if (onePassSigList.length && !signatureList.length && util.isStream(msg.packets.stream) && !isArrayStream(msg.packets.stream)) {
    +    const onePassSigList = packets.filterByTag(enums.packet.onePassSignature).reverse();
    +    const signatureList = packets.filterByTag(enums.packet.signature);
    +    if (onePassSigList.length && !signatureList.length && util.isStream(packets.stream) && !isArrayStream(packets.stream)) {
           await Promise.all(onePassSigList.map(async onePassSig => {
             onePassSig.correspondingSig = new Promise((resolve, reject) => {
               onePassSig.correspondingSigResolve = resolve;
    @@ -603,7 +604,7 @@ export class Message {
             onePassSig.hashed = streamReadToEnd(await onePassSig.hash(onePassSig.signatureType, literalDataList[0], undefined, false));
             onePassSig.hashed.catch(() => {});
           }));
    -      msg.packets.stream = streamTransformPair(msg.packets.stream, async (readable, writable) => {
    +      packets.stream = streamTransformPair(packets.stream, async (readable, writable) => {
             const reader = streamGetReader(readable);
             const writer = streamGetWriter(writable);
             try {
    

Vulnerability mechanics

Generated by null/stub on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

8

News mentions

0

No linked articles in our index yet.