Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-67825: n/a

0
Unknown
VulnerabilityCVE-2025-67825cvecve-2025-67825
Published: Thu Jan 08 2026 (01/08/2026, 00:00:00 UTC)
Source: CVE Database V5

Description

An issue was discovered in Nitro PDF Pro for Windows before 14.42.0.34. In certain cases, it displays signer information from a non-verified PDF field rather than from the verified certificate subject. This could allow a document to present inconsistent signer details. The display logic was updated to ensure signer information consistently reflects the verified certificate identity.

AI-Powered Analysis

AILast updated: 01/08/2026, 17:38:21 UTC

Technical Analysis

CVE-2025-67825 is a vulnerability identified in Nitro PDF Pro for Windows versions before 14.42.0.34. The flaw involves the software displaying signer information from a non-verified PDF field rather than the verified certificate subject in certain cases. Digital signatures in PDFs are intended to provide assurance about the identity of the signer and the integrity of the document. However, this vulnerability allows an attacker to craft a PDF where the displayed signer information is inconsistent with the actual verified certificate, potentially misleading users into trusting forged or tampered documents. The root cause is the display logic within Nitro PDF Pro that does not consistently source signer details from the verified certificate identity. This can result in a mismatch between what the user sees and the actual cryptographic verification status. Although no exploits have been reported in the wild, the vulnerability could be leveraged in targeted phishing or fraud schemes where document authenticity is critical. Nitro PDF Pro is widely used in business and government environments for document management and signing, making this vulnerability relevant for organizations that rely on PDF signatures for legal or compliance purposes. The vendor addressed the issue by updating the display logic in version 14.42.0.34 to ensure signer information always reflects the verified certificate subject, eliminating the inconsistency. The vulnerability does not require user authentication or complex exploitation techniques but does require the victim to open a specially crafted PDF document. No CVSS score has been assigned yet, but the impact on trustworthiness of digital signatures is significant.

Potential Impact

For European organizations, this vulnerability poses a risk to the integrity and authenticity of digitally signed documents, which are commonly used in legal, financial, and governmental processes. Misleading signer information can facilitate social engineering attacks, fraud, and unauthorized transactions by convincing recipients that documents are legitimately signed by trusted parties. This undermines compliance with regulations such as eIDAS, which governs electronic identification and trust services in the EU. The impact is particularly critical in sectors like finance, legal services, and public administration where document authenticity is paramount. Although the vulnerability does not directly compromise system confidentiality or availability, the erosion of trust in digital signatures can lead to significant operational and reputational damage. The absence of known exploits reduces immediate risk, but the potential for targeted attacks remains. Organizations that do not promptly update Nitro PDF Pro may be vulnerable to sophisticated forgery attempts that exploit this display inconsistency.

Mitigation Recommendations

To mitigate this vulnerability, organizations should immediately update Nitro PDF Pro for Windows to version 14.42.0.34 or later, where the display logic has been corrected. Additionally, implement strict policies for verifying digital signatures beyond visual inspection, such as using dedicated signature validation tools or integrated document management systems that enforce certificate verification. Train users to be cautious when reviewing signer information and to verify the cryptographic validity of signatures, especially in high-risk transactions. Consider deploying endpoint protection solutions that can detect and block suspicious PDF files. For environments with high document signing volumes, integrate automated signature validation workflows to reduce reliance on manual checks. Regularly audit and monitor document handling processes to detect anomalies or inconsistencies in signed documents. Finally, maintain awareness of updates from Nitro PDF Pro and related vendors to promptly address any future vulnerabilities.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-12-12T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 695fe7de2717593a336ad4ff

Added to database: 1/8/2026, 5:22:38 PM

Last enriched: 1/8/2026, 5:38:21 PM

Last updated: 1/9/2026, 12:39:34 PM

Views: 2

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats