CVE-2025-2866: CWE-347 Improper Verification of Cryptographic Signature in The Document Foundation LibreOffice
Improper Verification of Cryptographic Signature vulnerability in LibreOffice allows PDF Signature Spoofing by Improper Validation. In the affected versions of LibreOffice a flaw in the verification code for adbe.pkcs7.sha1 signatures could cause invalid signatures to be accepted as valid This issue affects LibreOffice: from 24.8 before < 24.8.6, from 25.2 before < 25.2.2.
AI Analysis
Technical Summary
CVE-2025-2866 is a vulnerability identified in The Document Foundation's LibreOffice software, specifically affecting versions 24.8 before 24.8.6 and 25.2 before 25.2.2. The issue stems from improper verification of cryptographic signatures, classified under CWE-347 (Improper Verification of Cryptographic Signature). The vulnerability concerns the handling of PDF digital signatures using the adbe.pkcs7.sha1 signature method. Due to a flaw in the verification logic, LibreOffice may incorrectly accept invalid or spoofed signatures as valid. This signature spoofing can mislead users into trusting documents that have been tampered with or forged, undermining the integrity and authenticity assurances typically provided by digital signatures. The vulnerability requires local access (AV:L) with low privileges (PR:L) and user interaction (UI:P) to exploit, as indicated by the CVSS 4.0 vector. The attack complexity is low (AC:L), but the impact on confidentiality, integrity, and availability is limited to low (VC:L, VI:N, VA:N). No known exploits are currently reported in the wild. The flaw primarily affects the integrity of document verification processes within LibreOffice's PDF handling, potentially enabling attackers to present malicious or altered documents as legitimately signed. This could have implications for workflows relying on LibreOffice for document validation and signing, especially in environments where document authenticity is critical.
Potential Impact
For European organizations, the impact of this vulnerability is primarily related to the risk of accepting forged or tampered PDF documents as authentic. This can undermine trust in document workflows, particularly in sectors such as legal, financial, governmental, and healthcare, where document signatures are used to verify authenticity and compliance. While the vulnerability does not directly compromise confidentiality or availability, the integrity breach could facilitate social engineering, fraud, or unauthorized approvals based on falsified documents. Organizations relying heavily on LibreOffice for document processing and signature verification may face increased risk of document forgery going undetected. However, the low CVSS score and requirement for local access and user interaction reduce the likelihood of widespread exploitation. The absence of known exploits in the wild further limits immediate risk. Nonetheless, the vulnerability could be leveraged in targeted attacks or insider threat scenarios where an attacker has some level of system access and can trick users into opening maliciously crafted PDF files.
Mitigation Recommendations
1. Immediate upgrade to LibreOffice versions 24.8.6 or later, or 25.2.2 or later, where the vulnerability has been patched, is the most effective mitigation. 2. Implement strict document handling policies that restrict opening PDF files from untrusted or unknown sources within LibreOffice, especially those purporting to have digital signatures. 3. Use alternative, dedicated PDF signature verification tools with robust cryptographic validation for critical workflows, rather than relying solely on LibreOffice's built-in verification. 4. Educate users on the risks of signature spoofing and the importance of verifying document provenance through multiple channels before acting on signed documents. 5. Employ endpoint security solutions that can detect and block attempts to open suspicious or malformed PDF files locally. 6. Monitor for unusual document-related activities or user behavior that might indicate exploitation attempts, such as unexpected signature validation failures or acceptance of dubious documents. 7. For environments with high security requirements, consider disabling PDF signature verification in LibreOffice until patched versions are deployed, if feasible.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Belgium, Sweden, Poland, Austria
CVE-2025-2866: CWE-347 Improper Verification of Cryptographic Signature in The Document Foundation LibreOffice
Description
Improper Verification of Cryptographic Signature vulnerability in LibreOffice allows PDF Signature Spoofing by Improper Validation. In the affected versions of LibreOffice a flaw in the verification code for adbe.pkcs7.sha1 signatures could cause invalid signatures to be accepted as valid This issue affects LibreOffice: from 24.8 before < 24.8.6, from 25.2 before < 25.2.2.
AI-Powered Analysis
Technical Analysis
CVE-2025-2866 is a vulnerability identified in The Document Foundation's LibreOffice software, specifically affecting versions 24.8 before 24.8.6 and 25.2 before 25.2.2. The issue stems from improper verification of cryptographic signatures, classified under CWE-347 (Improper Verification of Cryptographic Signature). The vulnerability concerns the handling of PDF digital signatures using the adbe.pkcs7.sha1 signature method. Due to a flaw in the verification logic, LibreOffice may incorrectly accept invalid or spoofed signatures as valid. This signature spoofing can mislead users into trusting documents that have been tampered with or forged, undermining the integrity and authenticity assurances typically provided by digital signatures. The vulnerability requires local access (AV:L) with low privileges (PR:L) and user interaction (UI:P) to exploit, as indicated by the CVSS 4.0 vector. The attack complexity is low (AC:L), but the impact on confidentiality, integrity, and availability is limited to low (VC:L, VI:N, VA:N). No known exploits are currently reported in the wild. The flaw primarily affects the integrity of document verification processes within LibreOffice's PDF handling, potentially enabling attackers to present malicious or altered documents as legitimately signed. This could have implications for workflows relying on LibreOffice for document validation and signing, especially in environments where document authenticity is critical.
Potential Impact
For European organizations, the impact of this vulnerability is primarily related to the risk of accepting forged or tampered PDF documents as authentic. This can undermine trust in document workflows, particularly in sectors such as legal, financial, governmental, and healthcare, where document signatures are used to verify authenticity and compliance. While the vulnerability does not directly compromise confidentiality or availability, the integrity breach could facilitate social engineering, fraud, or unauthorized approvals based on falsified documents. Organizations relying heavily on LibreOffice for document processing and signature verification may face increased risk of document forgery going undetected. However, the low CVSS score and requirement for local access and user interaction reduce the likelihood of widespread exploitation. The absence of known exploits in the wild further limits immediate risk. Nonetheless, the vulnerability could be leveraged in targeted attacks or insider threat scenarios where an attacker has some level of system access and can trick users into opening maliciously crafted PDF files.
Mitigation Recommendations
1. Immediate upgrade to LibreOffice versions 24.8.6 or later, or 25.2.2 or later, where the vulnerability has been patched, is the most effective mitigation. 2. Implement strict document handling policies that restrict opening PDF files from untrusted or unknown sources within LibreOffice, especially those purporting to have digital signatures. 3. Use alternative, dedicated PDF signature verification tools with robust cryptographic validation for critical workflows, rather than relying solely on LibreOffice's built-in verification. 4. Educate users on the risks of signature spoofing and the importance of verifying document provenance through multiple channels before acting on signed documents. 5. Employ endpoint security solutions that can detect and block attempts to open suspicious or malformed PDF files locally. 6. Monitor for unusual document-related activities or user behavior that might indicate exploitation attempts, such as unexpected signature validation failures or acceptance of dubious documents. 7. For environments with high security requirements, consider disabling PDF signature verification in LibreOffice until patched versions are deployed, if feasible.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Document Fdn.
- Date Reserved
- 2025-03-27T11:22:16.241Z
- Cisa Enriched
- true
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 682d983ec4522896dcbef9af
Added to database: 5/21/2025, 9:09:18 AM
Last enriched: 6/24/2025, 6:05:30 PM
Last updated: 8/16/2025, 7:23:31 PM
Views: 22
Related Threats
CVE-2025-41242: Vulnerability in VMware Spring Framework
MediumCVE-2025-47206: CWE-787 in QNAP Systems Inc. File Station 5
HighCVE-2025-5296: CWE-59 Improper Link Resolution Before File Access ('Link Following') in Schneider Electric SESU
HighCVE-2025-6625: CWE-20 Improper Input Validation in Schneider Electric Modicon M340
HighCVE-2025-57703: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Delta Electronics DIAEnergie
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.