Vulnerability Description
In GnuPG before 2.5.5, if a user chooses to import a certificate with certain crafted subkey data that lacks a valid backsig or that has incorrect usage flags, the user loses the ability to verify signatures made from certain other signing keys, aka a "verification DoS."
CVSS Score
LOW
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Gnupg | Gnupg | < 2.4.8 |
Related Weaknesses (CWE)
References
- https://dev.gnupg.org/T7527ExploitIssue Tracking
- https://dev.gnupg.org/rG48978ccb4e20866472ef18436a32744350a65158Issue Tracking
- https://lists.gnupg.org/pipermail/gnupg-announce/2025q1/000491.htmlMailing ListRelease NotesVendor Advisory
FAQ
What is CVE-2025-30258?
CVE-2025-30258 is a vulnerability with a CVSS score of 2.7 (LOW). In GnuPG before 2.5.5, if a user chooses to import a certificate with certain crafted subkey data that lacks a valid backsig or that has incorrect usage flags, the user loses the ability to verify sig...
How severe is CVE-2025-30258?
CVE-2025-30258 has been rated LOW with a CVSS base score of 2.7/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-30258?
Check the references section above for vendor advisories and patch information. Affected products include: Gnupg Gnupg.