CVE-2025-67825: n/a
An issue was discovered in Nitro PDF Pro for Windows before 14.42.0.34. In certain cases, it displays signer information from a non-verified PDF field rather than from the verified certificate subject. This could allow a document to present inconsistent signer details. The display logic was updated to ensure signer information consistently reflects the verified certificate identity.
AI Analysis
Technical Summary
CVE-2025-67825 is a vulnerability identified in Nitro PDF Pro for Windows versions before 14.42.0.34. The flaw involves the software displaying signer information from a non-verified PDF field rather than the verified certificate subject in certain cases. Digital signatures in PDFs are intended to provide assurance about the identity of the signer and the integrity of the document. However, this vulnerability allows an attacker to craft a PDF where the displayed signer information is inconsistent with the actual verified certificate, potentially misleading users into trusting forged or tampered documents. The root cause is the display logic within Nitro PDF Pro that does not consistently source signer details from the verified certificate identity. This can result in a mismatch between what the user sees and the actual cryptographic verification status. Although no exploits have been reported in the wild, the vulnerability could be leveraged in targeted phishing or fraud schemes where document authenticity is critical. Nitro PDF Pro is widely used in business and government environments for document management and signing, making this vulnerability relevant for organizations that rely on PDF signatures for legal or compliance purposes. The vendor addressed the issue by updating the display logic in version 14.42.0.34 to ensure signer information always reflects the verified certificate subject, eliminating the inconsistency. The vulnerability does not require user authentication or complex exploitation techniques but does require the victim to open a specially crafted PDF document. No CVSS score has been assigned yet, but the impact on trustworthiness of digital signatures is significant.
Potential Impact
For European organizations, this vulnerability poses a risk to the integrity and authenticity of digitally signed documents, which are commonly used in legal, financial, and governmental processes. Misleading signer information can facilitate social engineering attacks, fraud, and unauthorized transactions by convincing recipients that documents are legitimately signed by trusted parties. This undermines compliance with regulations such as eIDAS, which governs electronic identification and trust services in the EU. The impact is particularly critical in sectors like finance, legal services, and public administration where document authenticity is paramount. Although the vulnerability does not directly compromise system confidentiality or availability, the erosion of trust in digital signatures can lead to significant operational and reputational damage. The absence of known exploits reduces immediate risk, but the potential for targeted attacks remains. Organizations that do not promptly update Nitro PDF Pro may be vulnerable to sophisticated forgery attempts that exploit this display inconsistency.
Mitigation Recommendations
To mitigate this vulnerability, organizations should immediately update Nitro PDF Pro for Windows to version 14.42.0.34 or later, where the display logic has been corrected. Additionally, implement strict policies for verifying digital signatures beyond visual inspection, such as using dedicated signature validation tools or integrated document management systems that enforce certificate verification. Train users to be cautious when reviewing signer information and to verify the cryptographic validity of signatures, especially in high-risk transactions. Consider deploying endpoint protection solutions that can detect and block suspicious PDF files. For environments with high document signing volumes, integrate automated signature validation workflows to reduce reliance on manual checks. Regularly audit and monitor document handling processes to detect anomalies or inconsistencies in signed documents. Finally, maintain awareness of updates from Nitro PDF Pro and related vendors to promptly address any future vulnerabilities.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands
CVE-2025-67825: n/a
Description
An issue was discovered in Nitro PDF Pro for Windows before 14.42.0.34. In certain cases, it displays signer information from a non-verified PDF field rather than from the verified certificate subject. This could allow a document to present inconsistent signer details. The display logic was updated to ensure signer information consistently reflects the verified certificate identity.
AI-Powered Analysis
Technical Analysis
CVE-2025-67825 is a vulnerability identified in Nitro PDF Pro for Windows versions before 14.42.0.34. The flaw involves the software displaying signer information from a non-verified PDF field rather than the verified certificate subject in certain cases. Digital signatures in PDFs are intended to provide assurance about the identity of the signer and the integrity of the document. However, this vulnerability allows an attacker to craft a PDF where the displayed signer information is inconsistent with the actual verified certificate, potentially misleading users into trusting forged or tampered documents. The root cause is the display logic within Nitro PDF Pro that does not consistently source signer details from the verified certificate identity. This can result in a mismatch between what the user sees and the actual cryptographic verification status. Although no exploits have been reported in the wild, the vulnerability could be leveraged in targeted phishing or fraud schemes where document authenticity is critical. Nitro PDF Pro is widely used in business and government environments for document management and signing, making this vulnerability relevant for organizations that rely on PDF signatures for legal or compliance purposes. The vendor addressed the issue by updating the display logic in version 14.42.0.34 to ensure signer information always reflects the verified certificate subject, eliminating the inconsistency. The vulnerability does not require user authentication or complex exploitation techniques but does require the victim to open a specially crafted PDF document. No CVSS score has been assigned yet, but the impact on trustworthiness of digital signatures is significant.
Potential Impact
For European organizations, this vulnerability poses a risk to the integrity and authenticity of digitally signed documents, which are commonly used in legal, financial, and governmental processes. Misleading signer information can facilitate social engineering attacks, fraud, and unauthorized transactions by convincing recipients that documents are legitimately signed by trusted parties. This undermines compliance with regulations such as eIDAS, which governs electronic identification and trust services in the EU. The impact is particularly critical in sectors like finance, legal services, and public administration where document authenticity is paramount. Although the vulnerability does not directly compromise system confidentiality or availability, the erosion of trust in digital signatures can lead to significant operational and reputational damage. The absence of known exploits reduces immediate risk, but the potential for targeted attacks remains. Organizations that do not promptly update Nitro PDF Pro may be vulnerable to sophisticated forgery attempts that exploit this display inconsistency.
Mitigation Recommendations
To mitigate this vulnerability, organizations should immediately update Nitro PDF Pro for Windows to version 14.42.0.34 or later, where the display logic has been corrected. Additionally, implement strict policies for verifying digital signatures beyond visual inspection, such as using dedicated signature validation tools or integrated document management systems that enforce certificate verification. Train users to be cautious when reviewing signer information and to verify the cryptographic validity of signatures, especially in high-risk transactions. Consider deploying endpoint protection solutions that can detect and block suspicious PDF files. For environments with high document signing volumes, integrate automated signature validation workflows to reduce reliance on manual checks. Regularly audit and monitor document handling processes to detect anomalies or inconsistencies in signed documents. Finally, maintain awareness of updates from Nitro PDF Pro and related vendors to promptly address any future vulnerabilities.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- mitre
- Date Reserved
- 2025-12-12T00:00:00.000Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 695fe7de2717593a336ad4ff
Added to database: 1/8/2026, 5:22:38 PM
Last enriched: 1/8/2026, 5:38:21 PM
Last updated: 1/9/2026, 12:39:34 PM
Views: 2
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-14598: CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in BeeS Software Solutions BET ePortal
UnknownCVE-2025-66051: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Vivotek IP7137
MediumCVE-2025-66050: CWE-1393 Use of Default Password in Vivotek IP7137
CriticalCVE-2025-66049: CWE-306 Missing Authentication for Critical Function in Vivotek IP7137
HighCVE-2026-22081: CWE-1004 - Sensitive Cookie Without HttpOnly Flag in Tenda 300Mbps Wireless Router F3 and N300 Easy Setup Router
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.