SumatraPDF is a multi-format reader for Windows. In 3.5.0 through 3.5.2, SumatraPDF's update mechanism disables TLS hostname verification (INTERNET_FLAG_IGNORE_CERT_CN_INVALID) and executes installers without signature checks. A network attacker with any valid TLS certificate (e.g., Let's Encrypt) can intercept the update check request, inject a malicious installer URL, and achieve arbitrary code execution.
References
| Link | Resource |
|---|---|
| https://github.com/sumatrapdfreader/sumatrapdf/security/advisories/GHSA-xpm2-rr5m-x96q | Exploit Vendor Advisory |
Configurations
History
20 Feb 2026, 20:22
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:sumatrapdfreader:sumatrapdf:*:*:*:*:*:*:*:* | |
| Summary |
|
|
| References | () https://github.com/sumatrapdfreader/sumatrapdf/security/advisories/GHSA-xpm2-rr5m-x96q - Exploit, Vendor Advisory | |
| First Time |
Sumatrapdfreader
Sumatrapdfreader sumatrapdf |
09 Feb 2026, 22:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-02-09 22:16
Updated : 2026-02-20 20:22
NVD link : CVE-2026-25961
Mitre link : CVE-2026-25961
CVE.ORG link : CVE-2026-25961
JSON object : View
Products Affected
sumatrapdfreader
- sumatrapdf
