Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Fri, 20 Feb 2026 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:sumatrapdfreader:sumatrapdf:*:*:*:*:*:*:*:* |
Tue, 10 Feb 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 10 Feb 2026 12:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Sumatrapdfreader
Sumatrapdfreader sumatrapdf |
|
| Vendors & Products |
Sumatrapdfreader
Sumatrapdfreader sumatrapdf |
Mon, 09 Feb 2026 21:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | SumatraPDF is a multi-format reader for Windows. In 3.5.0 through 3.5.2, SumatraPDF's update mechanism disables TLS hostname verification (INTERNET_FLAG_IGNORE_CERT_CN_INVALID) and executes installers without signature checks. A network attacker with any valid TLS certificate (e.g., Let's Encrypt) can intercept the update check request, inject a malicious installer URL, and achieve arbitrary code execution. | |
| Title | SumatraPDF Update MITM -> Arbitrary Code Execution | |
| Weaknesses | CWE-295 CWE-494 |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-02-10T15:57:28.303Z
Reserved: 2026-02-09T17:13:54.066Z
Link: CVE-2026-25961
Updated: 2026-02-10T15:32:02.622Z
Status : Analyzed
Published: 2026-02-09T22:16:04.750
Modified: 2026-02-20T20:22:32.817
Link: CVE-2026-25961
No data.
OpenCVE Enrichment
Updated: 2026-04-17T21:15:27Z