OpenPGP.js Vulnerability: When Signature Spoofing Became a Comedy of Errors
OpenPGP.js developers have patched a critical vulnerability allowing attackers to spoof message signature verification. With just one valid signature and plaintext, attackers can make fake messages appear legit. Versions 5 and 6 are affected, but fear not—updates are here to save the day.

Hot Take:
Well, folks, looks like the OpenPGP.js team had a case of “signature envy” – so much so that anyone could slap a fake signature on their message and get away with it. Thankfully, they’ve patched it up before it turned into a full-blown forgery fiesta. Remember, if it sounds too good to be truly encrypted, it probably is.
Key Points:
- OpenPGP.js has patched a critical vulnerability that allowed message signature spoofing.
- The vulnerability was discovered by researchers at Codean Labs.
- The flaw affected OpenPGP.js versions 5 and 6.
- New versions, 5.11.3 and 6.1.1, have been released to fix the issue.
- The vulnerability is tracked as CVE-2025-47934.
Already a member? Log in here