Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-67825: n/a

0
Medium
VulnerabilityCVE-2025-67825cvecve-2025-67825
Published: Thu Jan 08 2026 (01/08/2026, 00:00:00 UTC)
Source: CVE Database V5

Description

An issue was discovered in Nitro PDF Pro for Windows before 14.42.0.34. In certain cases, it displays signer information from a non-verified PDF field rather than from the verified certificate subject. This could allow a document to present inconsistent signer details. The display logic was updated to ensure signer information consistently reflects the verified certificate identity.

AI-Powered Analysis

AILast updated: 02/03/2026, 08:16:26 UTC

Technical Analysis

CVE-2025-67825 is a vulnerability identified in Nitro PDF Pro for Windows versions before 14.42.0.34. The flaw involves the software's logic for displaying signer information in digitally signed PDF documents. Instead of consistently showing the signer details from the verified certificate subject, Nitro PDF Pro may display information from a non-verified PDF field. This discrepancy can cause users to see misleading signer details that do not correspond to the actual certificate used to sign the document. The root cause relates to improper validation and display logic, categorized under CWE-346 (Origin Validation Error). While the vulnerability does not allow direct code execution or data leakage, it undermines the integrity of digital signatures by enabling forged or altered signer information to appear legitimate. Exploiting this vulnerability requires a user to open a maliciously crafted PDF file locally, as the attack vector is local with low attack complexity and no privileges required. The CVSS 3.1 base score is 5.5 (medium), reflecting the impact on integrity without affecting confidentiality or availability. Nitro PDF Pro has updated its display logic in version 14.42.0.34 to ensure signer information always reflects the verified certificate identity, closing this gap.

Potential Impact

For European organizations, this vulnerability poses a significant risk to the trustworthiness of digitally signed documents, which are widely used in legal, financial, and governmental transactions. Misrepresentation of signer identity can lead to fraudulent contracts, unauthorized approvals, or manipulation of official documents. This undermines compliance with regulations such as eIDAS, which governs electronic identification and trust services in the EU. Although the vulnerability does not compromise system confidentiality or availability, the integrity breach can cause reputational damage, legal disputes, and financial losses. Organizations relying heavily on Nitro PDF Pro for document signing and verification, especially in sectors like banking, legal services, and public administration, are particularly vulnerable. The absence of known exploits reduces immediate risk but does not eliminate the threat of targeted attacks or social engineering leveraging this flaw.

Mitigation Recommendations

The primary mitigation is to upgrade Nitro PDF Pro to version 14.42.0.34 or later, where the display logic has been corrected. Organizations should enforce software update policies to ensure timely patching. Additionally, implement user training to recognize suspicious documents and verify signer certificates manually through alternative trusted tools or certificate authorities. Integrate multi-factor verification processes for critical document approvals to reduce reliance on a single signature display. Employ document management systems that validate digital signatures independently of the PDF viewer. For high-risk environments, consider restricting the use of Nitro PDF Pro to trusted personnel and sandboxing PDF viewing applications to limit exposure. Monitoring for anomalous document signing patterns and maintaining audit trails can help detect potential misuse.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-12-12T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 695fe7de2717593a336ad4ff

Added to database: 1/8/2026, 5:22:38 PM

Last enriched: 2/3/2026, 8:16:26 AM

Last updated: 2/4/2026, 10:54:18 AM

Views: 110

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats