CVE-2025-2866: CWE-347 Improper Verification of Cryptographic Signature in The Document Foundation LibreOffice
Improper Verification of Cryptographic Signature vulnerability in LibreOffice allows PDF Signature Spoofing by Improper Validation. In the affected versions of LibreOffice a flaw in the verification code for adbe.pkcs7.sha1 signatures could cause invalid signatures to be accepted as valid This issue affects LibreOffice: from 24.8 before < 24.8.6, from 25.2 before < 25.2.2.
AI Analysis
Technical Summary
CVE-2025-2866 is a cryptographic signature verification vulnerability in LibreOffice, specifically impacting the handling of adbe.pkcs7.sha1 signatures within PDF documents. The flaw is due to improper validation logic that can cause LibreOffice to accept invalid cryptographic signatures as valid, enabling an attacker to spoof PDF signatures. This undermines the trust model for digitally signed PDFs, potentially allowing malicious actors to present forged documents as legitimately signed. The vulnerability affects LibreOffice versions starting from 24.8 up to but not including 24.8.6, and from 25.2 up to but not including 25.2.2. Exploitation requires local access with low privileges and user interaction, such as opening a maliciously crafted PDF file. The CVSS 4.0 base score is 2.4, reflecting low severity due to limited impact and exploitation complexity. No known exploits have been reported in the wild, and no patches are linked in the provided data, but updates to fixed versions are recommended. The issue relates to CWE-347, which concerns improper verification of cryptographic signatures, a critical aspect of document security and authenticity verification.
Potential Impact
For European organizations, the primary impact is the potential for attackers to deceive users by presenting forged PDF documents that appear to have valid digital signatures. This can undermine trust in official documents, contracts, or communications, potentially leading to misinformation, fraud, or unauthorized actions based on spoofed documents. While the vulnerability does not directly compromise system confidentiality, integrity, or availability, it affects the integrity and authenticity of signed documents, which can have legal and operational consequences. Organizations relying heavily on LibreOffice for document handling, especially in regulated sectors such as government, legal, and finance, may face increased risk of document forgery attacks. The low severity and requirement for user interaction limit widespread exploitation, but targeted attacks against high-value targets remain a concern.
Mitigation Recommendations
1. Immediately update LibreOffice installations to versions 24.8.6 or later and 25.2.2 or later where the vulnerability is fixed. 2. Implement strict document handling policies that include verifying digital signatures using multiple tools or trusted external validators beyond LibreOffice's built-in verification. 3. Educate users about the risks of opening PDF documents from untrusted sources and encourage skepticism of unexpected signed documents. 4. Employ endpoint security solutions that can detect and block malicious PDF files or suspicious document manipulations. 5. For critical workflows, consider integrating cryptographic signature verification tools that adhere to stricter validation standards. 6. Monitor security advisories from The Document Foundation and related cybersecurity entities for updates or exploit reports. 7. Restrict local user privileges where possible to reduce the risk of exploitation requiring local access.
Affected Countries
Germany, France, Netherlands, Italy, Spain, Belgium, Sweden
CVE-2025-2866: CWE-347 Improper Verification of Cryptographic Signature in The Document Foundation LibreOffice
Description
Improper Verification of Cryptographic Signature vulnerability in LibreOffice allows PDF Signature Spoofing by Improper Validation. In the affected versions of LibreOffice a flaw in the verification code for adbe.pkcs7.sha1 signatures could cause invalid signatures to be accepted as valid This issue affects LibreOffice: from 24.8 before < 24.8.6, from 25.2 before < 25.2.2.
AI-Powered Analysis
Technical Analysis
CVE-2025-2866 is a cryptographic signature verification vulnerability in LibreOffice, specifically impacting the handling of adbe.pkcs7.sha1 signatures within PDF documents. The flaw is due to improper validation logic that can cause LibreOffice to accept invalid cryptographic signatures as valid, enabling an attacker to spoof PDF signatures. This undermines the trust model for digitally signed PDFs, potentially allowing malicious actors to present forged documents as legitimately signed. The vulnerability affects LibreOffice versions starting from 24.8 up to but not including 24.8.6, and from 25.2 up to but not including 25.2.2. Exploitation requires local access with low privileges and user interaction, such as opening a maliciously crafted PDF file. The CVSS 4.0 base score is 2.4, reflecting low severity due to limited impact and exploitation complexity. No known exploits have been reported in the wild, and no patches are linked in the provided data, but updates to fixed versions are recommended. The issue relates to CWE-347, which concerns improper verification of cryptographic signatures, a critical aspect of document security and authenticity verification.
Potential Impact
For European organizations, the primary impact is the potential for attackers to deceive users by presenting forged PDF documents that appear to have valid digital signatures. This can undermine trust in official documents, contracts, or communications, potentially leading to misinformation, fraud, or unauthorized actions based on spoofed documents. While the vulnerability does not directly compromise system confidentiality, integrity, or availability, it affects the integrity and authenticity of signed documents, which can have legal and operational consequences. Organizations relying heavily on LibreOffice for document handling, especially in regulated sectors such as government, legal, and finance, may face increased risk of document forgery attacks. The low severity and requirement for user interaction limit widespread exploitation, but targeted attacks against high-value targets remain a concern.
Mitigation Recommendations
1. Immediately update LibreOffice installations to versions 24.8.6 or later and 25.2.2 or later where the vulnerability is fixed. 2. Implement strict document handling policies that include verifying digital signatures using multiple tools or trusted external validators beyond LibreOffice's built-in verification. 3. Educate users about the risks of opening PDF documents from untrusted sources and encourage skepticism of unexpected signed documents. 4. Employ endpoint security solutions that can detect and block malicious PDF files or suspicious document manipulations. 5. For critical workflows, consider integrating cryptographic signature verification tools that adhere to stricter validation standards. 6. Monitor security advisories from The Document Foundation and related cybersecurity entities for updates or exploit reports. 7. Restrict local user privileges where possible to reduce the risk of exploitation requiring local access.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Document Fdn.
- Date Reserved
- 2025-03-27T11:22:16.241Z
- Cisa Enriched
- true
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 682d983ec4522896dcbef9af
Added to database: 5/21/2025, 9:09:18 AM
Last enriched: 11/4/2025, 2:31:28 AM
Last updated: 11/22/2025, 4:44:04 PM
Views: 52
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2023-30806: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Sangfor Net-Gen Application Firewall
CriticalCVE-2024-0401: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in ASUS ExpertWiFi
HighCVE-2024-23690: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Netgear FVS336Gv3
HighCVE-2024-13976: CWE-427 Uncontrolled Search Path Element in Commvault Commvault for Windows
HighCVE-2024-12856: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Four-Faith F3x24
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.