Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-2866: CWE-347 Improper Verification of Cryptographic Signature in The Document Foundation LibreOffice

0
Low
VulnerabilityCVE-2025-2866cvecve-2025-2866cwe-347
Published: Sun Apr 27 2025 (04/27/2025, 19:04:52 UTC)
Source: CVE
Vendor/Project: The Document Foundation
Product: LibreOffice

Description

Improper Verification of Cryptographic Signature vulnerability in LibreOffice allows PDF Signature Spoofing by Improper Validation. In the affected versions of LibreOffice a flaw in the verification code for adbe.pkcs7.sha1 signatures could cause invalid signatures to be accepted as valid This issue affects LibreOffice: from 24.8 before < 24.8.6, from 25.2 before < 25.2.2.

AI-Powered Analysis

AILast updated: 11/04/2025, 02:31:28 UTC

Technical Analysis

CVE-2025-2866 is a cryptographic signature verification vulnerability in LibreOffice, specifically impacting the handling of adbe.pkcs7.sha1 signatures within PDF documents. The flaw is due to improper validation logic that can cause LibreOffice to accept invalid cryptographic signatures as valid, enabling an attacker to spoof PDF signatures. This undermines the trust model for digitally signed PDFs, potentially allowing malicious actors to present forged documents as legitimately signed. The vulnerability affects LibreOffice versions starting from 24.8 up to but not including 24.8.6, and from 25.2 up to but not including 25.2.2. Exploitation requires local access with low privileges and user interaction, such as opening a maliciously crafted PDF file. The CVSS 4.0 base score is 2.4, reflecting low severity due to limited impact and exploitation complexity. No known exploits have been reported in the wild, and no patches are linked in the provided data, but updates to fixed versions are recommended. The issue relates to CWE-347, which concerns improper verification of cryptographic signatures, a critical aspect of document security and authenticity verification.

Potential Impact

For European organizations, the primary impact is the potential for attackers to deceive users by presenting forged PDF documents that appear to have valid digital signatures. This can undermine trust in official documents, contracts, or communications, potentially leading to misinformation, fraud, or unauthorized actions based on spoofed documents. While the vulnerability does not directly compromise system confidentiality, integrity, or availability, it affects the integrity and authenticity of signed documents, which can have legal and operational consequences. Organizations relying heavily on LibreOffice for document handling, especially in regulated sectors such as government, legal, and finance, may face increased risk of document forgery attacks. The low severity and requirement for user interaction limit widespread exploitation, but targeted attacks against high-value targets remain a concern.

Mitigation Recommendations

1. Immediately update LibreOffice installations to versions 24.8.6 or later and 25.2.2 or later where the vulnerability is fixed. 2. Implement strict document handling policies that include verifying digital signatures using multiple tools or trusted external validators beyond LibreOffice's built-in verification. 3. Educate users about the risks of opening PDF documents from untrusted sources and encourage skepticism of unexpected signed documents. 4. Employ endpoint security solutions that can detect and block malicious PDF files or suspicious document manipulations. 5. For critical workflows, consider integrating cryptographic signature verification tools that adhere to stricter validation standards. 6. Monitor security advisories from The Document Foundation and related cybersecurity entities for updates or exploit reports. 7. Restrict local user privileges where possible to reduce the risk of exploitation requiring local access.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Document Fdn.
Date Reserved
2025-03-27T11:22:16.241Z
Cisa Enriched
true
Cvss Version
4.0
State
PUBLISHED

Threat ID: 682d983ec4522896dcbef9af

Added to database: 5/21/2025, 9:09:18 AM

Last enriched: 11/4/2025, 2:31:28 AM

Last updated: 11/22/2025, 4:44:04 PM

Views: 52

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats