Cyber Posture

CVE-2026-25961

HighPublic PoC

Published: 09 February 2026

Published
09 February 2026
Modified
20 February 2026
KEV Added
Patch
CVSS Score 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
EPSS Score 0.0010 28.1th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-25961 is a high-severity Improper Certificate Validation (CWE-295) vulnerability in Sumatrapdfreader Sumatrapdf. Its CVSS base score is 7.5 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Ingress Tool Transfer (T1105); ranked at the 28.1th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

Threat & Defense at a Glance

What attackers do: exploitation maps to Ingress Tool Transfer (T1105) and 2 other techniques.
Threat & Defense Details

Likely Mitigating ControlsAI

Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.

addresses: CWE-494 CWE-295

Component authenticity requires verifying origin/integrity of acquired firmware or software, directly preventing inclusion of code without integrity checks.

addresses: CWE-494

Policies can require integrity verification of software prior to installation, reducing risks from unverified downloads.

addresses: CWE-494

Blocks installation of components lacking a valid signature, mitigating download or installation of code without integrity checks.

addresses: CWE-494

Acquisition and maintenance portions of the strategy drive requirements for integrity verification of downloaded or supplied code.

addresses: CWE-494

Mandating integrity control and approved-only changes during development prevents incorporation of code or components lacking integrity validation.

addresses: CWE-494

Supply chain protection requires integrity verification of acquired components, directly reducing insertion or tampering of malicious code during delivery.

addresses: CWE-494

Reduces exposure to code obtained without integrity verification by requiring assurance processes that confirm authenticity and absence of tampering.

addresses: CWE-494

Tamper resistance and detection commonly include integrity verification of code and firmware obtained from external sources.

MITRE ATT&CK Enterprise TechniquesAI

T1105 Ingress Tool Transfer Command And Control
Adversaries may transfer tools or other files from an external system into a compromised environment.
T1204.002 Malicious File Execution
An adversary may rely upon a user opening a malicious file in order to gain execution.
T1557 Adversary-in-the-Middle Credential Access
Adversaries may attempt to position themselves between two or more networked devices using an adversary-in-the-middle (AiTM) technique to support follow-on behaviors such as [Network Sniffing](https://attack.
Why these techniques?

Vulnerability in update mechanism (disabled TLS hostname verification + missing installer signature checks) directly enables MITM attacker to deliver and trigger execution of arbitrary code via malicious update payload.

Confidence: MEDIUM · MITRE ATT&CK Enterprise v18.1

NVD Description

SumatraPDF is a multi-format reader for Windows. In 3.5.0 through 3.5.2, SumatraPDF's update mechanism disables TLS hostname verification (INTERNET_FLAG_IGNORE_CERT_CN_INVALID) and executes installers without signature checks. A network attacker with any valid TLS certificate (e.g., Let's Encrypt) can intercept the update…

more

check request, inject a malicious installer URL, and achieve arbitrary code execution.

Deeper analysisAI

CVE-2026-25961 affects SumatraPDF, a multi-format reader for Windows, specifically versions 3.5.0 through 3.5.2. The vulnerability lies in the application's update mechanism, which disables TLS hostname verification by using the INTERNET_FLAG_IGNORE_CERT_CN_INVALID flag and executes downloaded installers without performing signature checks. This issue, published on 2026-02-09, is associated with CWE-295 (Improper Certificate Validation) and CWE-494 (Download of Code Without Integrity Check), earning a CVSS v3.1 base score of 7.5 (AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H).

A network-based attacker positioned to perform a man-in-the-middle interception can exploit this vulnerability if they possess any valid TLS certificate, such as one issued by Let's Encrypt. By intercepting the update check request from a victim user, the attacker can inject a malicious installer URL. If the user interacts with the update process (UI:R), the application will download and execute the malicious installer, resulting in arbitrary code execution on the victim's Windows system with the user's privileges.

Mitigation details and patches are outlined in the official GitHub security advisory at https://github.com/sumatrapdfreader/sumatrapdf/security/advisories/GHSA-xpm2-rr5m-x96q.

Details

CWE(s)

Affected Products

sumatrapdfreader
sumatrapdf
3.5 — 3.5.2

CVEs Like This One

CVE-2026-25880Same product: Sumatrapdfreader Sumatrapdf
CVE-2026-23512Same product: Sumatrapdfreader Sumatrapdf
CVE-2025-1193Shared CWE-295
CVE-2025-46788Shared CWE-295
CVE-2026-33810Shared CWE-295
CVE-2026-32627Shared CWE-295
CVE-2024-55581Shared CWE-295
CVE-2025-11043Shared CWE-295
CVE-2026-4434Shared CWE-295
CVE-2026-25160Shared CWE-295

References