CVE-2025-4575
Severity CVSS v4.0:
Pending analysis
Type:
CWE-295
Improper Certificate Validation
Publication date:
22/05/2025
Last modified:
23/10/2025
Description
Issue summary: Use of -addreject option with the openssl x509 application adds<br />
a trusted use instead of a rejected use for a certificate.<br />
<br />
Impact summary: If a user intends to make a trusted certificate rejected for<br />
a particular use it will be instead marked as trusted for that use.<br />
<br />
A copy & paste error during minor refactoring of the code introduced this<br />
issue in the OpenSSL 3.5 version. If, for example, a trusted CA certificate<br />
should be trusted only for the purpose of authenticating TLS servers but not<br />
for CMS signature verification and the CMS signature verification is intended<br />
to be marked as rejected with the -addreject option, the resulting CA<br />
certificate will be trusted for CMS signature verification purpose instead.<br />
<br />
Only users which use the trusted certificate format who use the openssl x509<br />
command line application to add rejected uses are affected by this issue.<br />
The issues affecting only the command line application are considered to<br />
be Low severity.<br />
<br />
The FIPS modules in 3.5, 3.4, 3.3, 3.2, 3.1 and 3.0 are not affected by this<br />
issue.<br />
<br />
OpenSSL 3.4, 3.3, 3.2, 3.1, 3.0, 1.1.1 and 1.0.2 are also not affected by this<br />
issue.
Impact
Base Score 3.x
6.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:openssl:openssl:3.5.0:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page



