CVE-2025-4575: CWE-295 Improper Certificate Validation in OpenSSL OpenSSL
Issue summary: Use of -addreject option with the openssl x509 application adds a trusted use instead of a rejected use for a certificate. Impact summary: If a user intends to make a trusted certificate rejected for a particular use it will be instead marked as trusted for that use. A copy & paste error during minor refactoring of the code introduced this issue in the OpenSSL 3.5 version. If, for example, a trusted CA certificate should be trusted only for the purpose of authenticating TLS servers but not for CMS signature verification and the CMS signature verification is intended to be marked as rejected with the -addreject option, the resulting CA certificate will be trusted for CMS signature verification purpose instead. Only users which use the trusted certificate format who use the openssl x509 command line application to add rejected uses are affected by this issue. The issues affecting only the command line application are considered to be Low severity. The FIPS modules in 3.5, 3.4, 3.3, 3.2, 3.1 and 3.0 are not affected by this issue. OpenSSL 3.4, 3.3, 3.2, 3.1, 3.0, 1.1.1 and 1.0.2 are also not affected by this issue.
AI Analysis
Technical Summary
CVE-2025-4575 is a vulnerability in OpenSSL version 3.5.0 related to improper certificate validation, specifically a logic error introduced during minor code refactoring affecting the -addreject option of the openssl x509 command line tool. The -addreject option is intended to mark certain certificate usages as rejected, thereby preventing a certificate from being trusted for those specific purposes. However, due to a copy-paste error, the option incorrectly adds a trusted usage instead of a rejected usage for the certificate. This means that if a user attempts to reject a certificate for a particular use (e.g., CMS signature verification), the certificate will instead be trusted for that use, contrary to the user's intention. This flaw only affects users who rely on the trusted certificate format and use the openssl x509 command line application to add rejected uses. Other OpenSSL versions, including 3.4 and earlier, as well as all FIPS modules from 3.0 to 3.5, are not affected. The vulnerability is classified under CWE-295 (Improper Certificate Validation) and has a CVSS v3.1 score of 6.5 (medium severity), reflecting a network attack vector with low attack complexity, no privileges or user interaction required, and impacts on integrity and availability but not confidentiality. No known exploits are currently reported in the wild. The issue could lead to unintended trust of certificates for usages that should have been rejected, potentially allowing misuse of certificates in cryptographic operations such as CMS signature verification, which could undermine the integrity of signed data or authentication processes relying on these certificates. However, since the flaw is limited to a specific command line usage scenario and does not affect the core OpenSSL libraries or FIPS modules, the overall risk is limited to environments where administrators or automated processes use the vulnerable openssl x509 tool with the -addreject option on OpenSSL 3.5.0.
Potential Impact
For European organizations, the impact of CVE-2025-4575 is relatively contained but still significant in specific contexts. Organizations that manage their own certificate trust stores using OpenSSL 3.5.0 and rely on the openssl x509 command line tool to enforce certificate usage restrictions may inadvertently trust certificates for unintended purposes. This could weaken cryptographic trust boundaries, potentially allowing forged or misused certificates to validate CMS signatures or other operations that should have been rejected. Such a scenario could lead to acceptance of maliciously crafted signed content, undermining data integrity and non-repudiation assurances. Critical sectors such as finance, healthcare, government, and telecommunications that rely heavily on certificate-based authentication and signing could be affected if they use the vulnerable tool in their certificate management workflows. However, since the vulnerability does not affect the core OpenSSL libraries or FIPS modules, applications using these components without the vulnerable command line usage are not impacted. The lack of known exploits and the medium severity rating suggest that the threat is moderate, but organizations should assess their usage of OpenSSL 3.5.0 and the specific command line options to determine exposure. The impact on availability is minimal but possible if certificate validation failures or misconfigurations occur due to this issue.
Mitigation Recommendations
To mitigate CVE-2025-4575, European organizations should: 1) Avoid using OpenSSL version 3.5.0 for certificate management tasks involving the -addreject option with the openssl x509 command line tool. Instead, use earlier or later patched versions of OpenSSL where this issue is resolved. 2) Review and audit certificate trust stores and usage restrictions configured via the openssl x509 tool to ensure no unintended trusted usages have been introduced. 3) Implement strict change management and validation procedures for certificate trust configurations to detect anomalies caused by this vulnerability. 4) Where possible, use FIPS-validated OpenSSL modules (3.0 through 3.5) which are not affected by this issue. 5) Monitor OpenSSL vendor advisories for patches or updates addressing this vulnerability and apply them promptly. 6) Educate system administrators and security teams about the specific risk associated with the -addreject option misuse to prevent accidental misconfiguration. 7) Employ additional certificate validation layers or tools that do not rely solely on the openssl x509 command line tool for critical trust decisions. These steps go beyond generic advice by focusing on the specific command line usage and version affected, emphasizing audit and validation of certificate usage restrictions.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden, Belgium, Poland, Finland
CVE-2025-4575: CWE-295 Improper Certificate Validation in OpenSSL OpenSSL
Description
Issue summary: Use of -addreject option with the openssl x509 application adds a trusted use instead of a rejected use for a certificate. Impact summary: If a user intends to make a trusted certificate rejected for a particular use it will be instead marked as trusted for that use. A copy & paste error during minor refactoring of the code introduced this issue in the OpenSSL 3.5 version. If, for example, a trusted CA certificate should be trusted only for the purpose of authenticating TLS servers but not for CMS signature verification and the CMS signature verification is intended to be marked as rejected with the -addreject option, the resulting CA certificate will be trusted for CMS signature verification purpose instead. Only users which use the trusted certificate format who use the openssl x509 command line application to add rejected uses are affected by this issue. The issues affecting only the command line application are considered to be Low severity. The FIPS modules in 3.5, 3.4, 3.3, 3.2, 3.1 and 3.0 are not affected by this issue. OpenSSL 3.4, 3.3, 3.2, 3.1, 3.0, 1.1.1 and 1.0.2 are also not affected by this issue.
AI-Powered Analysis
Technical Analysis
CVE-2025-4575 is a vulnerability in OpenSSL version 3.5.0 related to improper certificate validation, specifically a logic error introduced during minor code refactoring affecting the -addreject option of the openssl x509 command line tool. The -addreject option is intended to mark certain certificate usages as rejected, thereby preventing a certificate from being trusted for those specific purposes. However, due to a copy-paste error, the option incorrectly adds a trusted usage instead of a rejected usage for the certificate. This means that if a user attempts to reject a certificate for a particular use (e.g., CMS signature verification), the certificate will instead be trusted for that use, contrary to the user's intention. This flaw only affects users who rely on the trusted certificate format and use the openssl x509 command line application to add rejected uses. Other OpenSSL versions, including 3.4 and earlier, as well as all FIPS modules from 3.0 to 3.5, are not affected. The vulnerability is classified under CWE-295 (Improper Certificate Validation) and has a CVSS v3.1 score of 6.5 (medium severity), reflecting a network attack vector with low attack complexity, no privileges or user interaction required, and impacts on integrity and availability but not confidentiality. No known exploits are currently reported in the wild. The issue could lead to unintended trust of certificates for usages that should have been rejected, potentially allowing misuse of certificates in cryptographic operations such as CMS signature verification, which could undermine the integrity of signed data or authentication processes relying on these certificates. However, since the flaw is limited to a specific command line usage scenario and does not affect the core OpenSSL libraries or FIPS modules, the overall risk is limited to environments where administrators or automated processes use the vulnerable openssl x509 tool with the -addreject option on OpenSSL 3.5.0.
Potential Impact
For European organizations, the impact of CVE-2025-4575 is relatively contained but still significant in specific contexts. Organizations that manage their own certificate trust stores using OpenSSL 3.5.0 and rely on the openssl x509 command line tool to enforce certificate usage restrictions may inadvertently trust certificates for unintended purposes. This could weaken cryptographic trust boundaries, potentially allowing forged or misused certificates to validate CMS signatures or other operations that should have been rejected. Such a scenario could lead to acceptance of maliciously crafted signed content, undermining data integrity and non-repudiation assurances. Critical sectors such as finance, healthcare, government, and telecommunications that rely heavily on certificate-based authentication and signing could be affected if they use the vulnerable tool in their certificate management workflows. However, since the vulnerability does not affect the core OpenSSL libraries or FIPS modules, applications using these components without the vulnerable command line usage are not impacted. The lack of known exploits and the medium severity rating suggest that the threat is moderate, but organizations should assess their usage of OpenSSL 3.5.0 and the specific command line options to determine exposure. The impact on availability is minimal but possible if certificate validation failures or misconfigurations occur due to this issue.
Mitigation Recommendations
To mitigate CVE-2025-4575, European organizations should: 1) Avoid using OpenSSL version 3.5.0 for certificate management tasks involving the -addreject option with the openssl x509 command line tool. Instead, use earlier or later patched versions of OpenSSL where this issue is resolved. 2) Review and audit certificate trust stores and usage restrictions configured via the openssl x509 tool to ensure no unintended trusted usages have been introduced. 3) Implement strict change management and validation procedures for certificate trust configurations to detect anomalies caused by this vulnerability. 4) Where possible, use FIPS-validated OpenSSL modules (3.0 through 3.5) which are not affected by this issue. 5) Monitor OpenSSL vendor advisories for patches or updates addressing this vulnerability and apply them promptly. 6) Educate system administrators and security teams about the specific risk associated with the -addreject option misuse to prevent accidental misconfiguration. 7) Employ additional certificate validation layers or tools that do not rely solely on the openssl x509 command line tool for critical trust decisions. These steps go beyond generic advice by focusing on the specific command line usage and version affected, emphasizing audit and validation of certificate usage restrictions.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- openssl
- Date Reserved
- 2025-05-12T12:08:11.215Z
- Cisa Enriched
- false
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682f2c0b0acd01a24925c223
Added to database: 5/22/2025, 1:52:11 PM
Last enriched: 7/8/2025, 9:27:53 AM
Last updated: 8/14/2025, 7:44:03 AM
Views: 37
Related Threats
CVE-2025-9022: SQL Injection in SourceCodester Online Bank Management System
MediumCVE-2025-9021: SQL Injection in SourceCodester Online Bank Management System
MediumCVE-2025-9020: Use After Free in PX4 PX4-Autopilot
LowCVE-2025-8604: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in wptb WP Table Builder – WordPress Table Plugin
MediumCVE-2025-9016: Uncontrolled Search Path in Mechrevo Control Center GX V2
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.