CVE-2025-67825: n/a
An issue was discovered in Nitro PDF Pro for Windows before 14.42.0.34. In certain cases, it displays signer information from a non-verified PDF field rather than from the verified certificate subject. This could allow a document to present inconsistent signer details. The display logic was updated to ensure signer information consistently reflects the verified certificate identity.
AI Analysis
Technical Summary
CVE-2025-67825 is a vulnerability identified in Nitro PDF Pro for Windows versions before 14.42.0.34. The flaw involves the software's logic for displaying signer information in digitally signed PDF documents. Instead of consistently showing the signer details from the verified certificate subject, Nitro PDF Pro may display information from a non-verified PDF field. This discrepancy can cause users to see misleading signer details that do not correspond to the actual certificate used to sign the document. The root cause relates to improper validation and display logic, categorized under CWE-346 (Origin Validation Error). While the vulnerability does not allow direct code execution or data leakage, it undermines the integrity of digital signatures by enabling forged or altered signer information to appear legitimate. Exploiting this vulnerability requires a user to open a maliciously crafted PDF file locally, as the attack vector is local with low attack complexity and no privileges required. The CVSS 3.1 base score is 5.5 (medium), reflecting the impact on integrity without affecting confidentiality or availability. Nitro PDF Pro has updated its display logic in version 14.42.0.34 to ensure signer information always reflects the verified certificate identity, closing this gap.
Potential Impact
For European organizations, this vulnerability poses a significant risk to the trustworthiness of digitally signed documents, which are widely used in legal, financial, and governmental transactions. Misrepresentation of signer identity can lead to fraudulent contracts, unauthorized approvals, or manipulation of official documents. This undermines compliance with regulations such as eIDAS, which governs electronic identification and trust services in the EU. Although the vulnerability does not compromise system confidentiality or availability, the integrity breach can cause reputational damage, legal disputes, and financial losses. Organizations relying heavily on Nitro PDF Pro for document signing and verification, especially in sectors like banking, legal services, and public administration, are particularly vulnerable. The absence of known exploits reduces immediate risk but does not eliminate the threat of targeted attacks or social engineering leveraging this flaw.
Mitigation Recommendations
The primary mitigation is to upgrade Nitro PDF Pro to version 14.42.0.34 or later, where the display logic has been corrected. Organizations should enforce software update policies to ensure timely patching. Additionally, implement user training to recognize suspicious documents and verify signer certificates manually through alternative trusted tools or certificate authorities. Integrate multi-factor verification processes for critical document approvals to reduce reliance on a single signature display. Employ document management systems that validate digital signatures independently of the PDF viewer. For high-risk environments, consider restricting the use of Nitro PDF Pro to trusted personnel and sandboxing PDF viewing applications to limit exposure. Monitoring for anomalous document signing patterns and maintaining audit trails can help detect potential misuse.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Belgium, Sweden
CVE-2025-67825: n/a
Description
An issue was discovered in Nitro PDF Pro for Windows before 14.42.0.34. In certain cases, it displays signer information from a non-verified PDF field rather than from the verified certificate subject. This could allow a document to present inconsistent signer details. The display logic was updated to ensure signer information consistently reflects the verified certificate identity.
AI-Powered Analysis
Technical Analysis
CVE-2025-67825 is a vulnerability identified in Nitro PDF Pro for Windows versions before 14.42.0.34. The flaw involves the software's logic for displaying signer information in digitally signed PDF documents. Instead of consistently showing the signer details from the verified certificate subject, Nitro PDF Pro may display information from a non-verified PDF field. This discrepancy can cause users to see misleading signer details that do not correspond to the actual certificate used to sign the document. The root cause relates to improper validation and display logic, categorized under CWE-346 (Origin Validation Error). While the vulnerability does not allow direct code execution or data leakage, it undermines the integrity of digital signatures by enabling forged or altered signer information to appear legitimate. Exploiting this vulnerability requires a user to open a maliciously crafted PDF file locally, as the attack vector is local with low attack complexity and no privileges required. The CVSS 3.1 base score is 5.5 (medium), reflecting the impact on integrity without affecting confidentiality or availability. Nitro PDF Pro has updated its display logic in version 14.42.0.34 to ensure signer information always reflects the verified certificate identity, closing this gap.
Potential Impact
For European organizations, this vulnerability poses a significant risk to the trustworthiness of digitally signed documents, which are widely used in legal, financial, and governmental transactions. Misrepresentation of signer identity can lead to fraudulent contracts, unauthorized approvals, or manipulation of official documents. This undermines compliance with regulations such as eIDAS, which governs electronic identification and trust services in the EU. Although the vulnerability does not compromise system confidentiality or availability, the integrity breach can cause reputational damage, legal disputes, and financial losses. Organizations relying heavily on Nitro PDF Pro for document signing and verification, especially in sectors like banking, legal services, and public administration, are particularly vulnerable. The absence of known exploits reduces immediate risk but does not eliminate the threat of targeted attacks or social engineering leveraging this flaw.
Mitigation Recommendations
The primary mitigation is to upgrade Nitro PDF Pro to version 14.42.0.34 or later, where the display logic has been corrected. Organizations should enforce software update policies to ensure timely patching. Additionally, implement user training to recognize suspicious documents and verify signer certificates manually through alternative trusted tools or certificate authorities. Integrate multi-factor verification processes for critical document approvals to reduce reliance on a single signature display. Employ document management systems that validate digital signatures independently of the PDF viewer. For high-risk environments, consider restricting the use of Nitro PDF Pro to trusted personnel and sandboxing PDF viewing applications to limit exposure. Monitoring for anomalous document signing patterns and maintaining audit trails can help detect potential misuse.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- mitre
- Date Reserved
- 2025-12-12T00:00:00.000Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 695fe7de2717593a336ad4ff
Added to database: 1/8/2026, 5:22:38 PM
Last enriched: 2/3/2026, 8:16:26 AM
Last updated: 2/4/2026, 10:54:18 AM
Views: 110
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-59818: Vulnerability in Zenitel TCIS-3+
CriticalCVE-2025-41085: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Apidog Apidog Web Platform
MediumDetecting and Monitoring OpenClaw (clawdbot, moltbot), (Tue, Feb 3rd)
MediumMalicious Script Delivering More Maliciousness, (Wed, Feb 4th)
MediumEclipse Foundation Mandates Pre-Publish Security Checks for Open VSX Extensions
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.