Search for vulnerabilities
Vulnerability details: VCID-pfcg-gq38-4yf5
Vulnerability ID VCID-pfcg-gq38-4yf5
Aliases CVE-2025-4575
Summary Issue summary: Use of -addreject option with the openssl x509 application adds a trusted use instead of a rejected use for a certificate. Impact summary: If a user intends to make a trusted certificate rejected for a particular use it will be instead marked as trusted for that use. A copy & paste error during minor refactoring of the code introduced this issue in the OpenSSL 3.5 version. If, for example, a trusted CA certificate should be trusted only for the purpose of authenticating TLS servers but not for CMS signature verification and the CMS signature verification is intended to be marked as rejected with the -addreject option, the resulting CA certificate will be trusted for CMS signature verification purpose instead. Only users which use the trusted certificate format who use the openssl x509 command line application to add rejected uses are affected by this issue. The issues affecting only the command line application are considered to be Low severity. The FIPS modules in 3.5, 3.4, 3.3, 3.2, 3.1 and 3.0 are not affected by this issue. OpenSSL 3.4, 3.3, 3.2, 3.1, 3.0, 1.1.1 and 1.0.2 are also not affected by this issue.
Status Published
Exploitability 0.5
Weighted Severity 5.9
Risk 3.0
Affected and Fixed Packages Package Details
Weaknesses (1)
System Score Found at
epss 0.0002 https://api.first.org/data/v1/epss?cve=CVE-2025-4575
epss 0.0002 https://api.first.org/data/v1/epss?cve=CVE-2025-4575
epss 0.0002 https://api.first.org/data/v1/epss?cve=CVE-2025-4575
epss 0.0002 https://api.first.org/data/v1/epss?cve=CVE-2025-4575
epss 0.00027 https://api.first.org/data/v1/epss?cve=CVE-2025-4575
epss 0.00027 https://api.first.org/data/v1/epss?cve=CVE-2025-4575
epss 0.00027 https://api.first.org/data/v1/epss?cve=CVE-2025-4575
epss 0.00027 https://api.first.org/data/v1/epss?cve=CVE-2025-4575
epss 0.00027 https://api.first.org/data/v1/epss?cve=CVE-2025-4575
epss 0.00027 https://api.first.org/data/v1/epss?cve=CVE-2025-4575
epss 0.00027 https://api.first.org/data/v1/epss?cve=CVE-2025-4575
epss 0.00027 https://api.first.org/data/v1/epss?cve=CVE-2025-4575
epss 0.00027 https://api.first.org/data/v1/epss?cve=CVE-2025-4575
epss 0.00027 https://api.first.org/data/v1/epss?cve=CVE-2025-4575
epss 0.00027 https://api.first.org/data/v1/epss?cve=CVE-2025-4575
epss 0.00027 https://api.first.org/data/v1/epss?cve=CVE-2025-4575
epss 0.00027 https://api.first.org/data/v1/epss?cve=CVE-2025-4575
epss 0.00027 https://api.first.org/data/v1/epss?cve=CVE-2025-4575
epss 0.00027 https://api.first.org/data/v1/epss?cve=CVE-2025-4575
epss 0.00027 https://api.first.org/data/v1/epss?cve=CVE-2025-4575
epss 0.00029 https://api.first.org/data/v1/epss?cve=CVE-2025-4575
cvssv3.1 6.5 https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
cvssv3.1 6.5 https://github.com/openssl/openssl/commit/e96d22446e633d117e6c9904cb15b4693e956eaa
ssvc Track https://github.com/openssl/openssl/commit/e96d22446e633d117e6c9904cb15b4693e956eaa
cvssv3.1 6.5 https://openssl-library.org/news/secadv/20250522.txt
ssvc Track https://openssl-library.org/news/secadv/20250522.txt
archlinux Low https://security.archlinux.org/AVG-2882
No exploits are available.
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L Found at https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L Found at https://github.com/openssl/openssl/commit/e96d22446e633d117e6c9904cb15b4693e956eaa
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-22T14:30:40Z/ Found at https://github.com/openssl/openssl/commit/e96d22446e633d117e6c9904cb15b4693e956eaa
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L Found at https://openssl-library.org/news/secadv/20250522.txt
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-22T14:30:40Z/ Found at https://openssl-library.org/news/secadv/20250522.txt
Exploit Prediction Scoring System (EPSS)
Percentile 0.03765
EPSS Score 0.0002
Published At May 23, 2025, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
2025-05-22T20:09:01.681430+00:00 Debian Importer Import https://security-tracker.debian.org/tracker/data/json 36.0.0