CVE-2026-25961

7.5 HIGH

📋 TL;DR

This vulnerability allows network attackers to intercept SumatraPDF's update requests and deliver malicious installers due to disabled TLS hostname verification and missing signature checks. Attackers can achieve arbitrary code execution on affected systems. Users running SumatraPDF versions 3.5.0 through 3.5.2 on Windows are affected.

💻 Affected Systems

Products:
  • SumatraPDF
Versions: 3.5.0 through 3.5.2
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: All installations within affected version range are vulnerable; no special configuration required for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with attacker gaining complete control over the victim's computer, enabling data theft, ransomware deployment, or persistent backdoor installation.

🟠

Likely Case

Malware installation leading to credential theft, cryptocurrency mining, or botnet enrollment when users attempt to update SumatraPDF.

🟢

If Mitigated

Attack fails due to network segmentation, proxy filtering, or user awareness preventing update checks on untrusted networks.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires network position to intercept HTTP traffic; any valid TLS certificate works due to disabled hostname verification.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 3.5.3 and later

Vendor Advisory: https://github.com/sumatrapdfreader/sumatrapdf/security/advisories/GHSA-xpm2-rr5m-x96q

Restart Required: No

Instructions:

1. Download SumatraPDF 3.5.3 or later from official website. 2. Run installer to update existing installation. 3. Verify version in Help > About shows 3.5.3 or higher.

🔧 Temporary Workarounds

Disable automatic updates

windows

Prevent SumatraPDF from checking for updates by disabling the automatic update feature.

Settings > Advanced Options > Set 'CheckForUpdates' to false in SumatraPDF-settings.txt

Block update domains

all

Use firewall or DNS filtering to block connections to SumatraPDF update servers.

Block *.kjkpub.net and *.sumatrapdfreader.org at firewall/DNS level

🧯 If You Can't Patch

  • Disable SumatraPDF update feature completely via registry or configuration file.
  • Use network segmentation to prevent SumatraPDF from accessing external update servers.

🔍 How to Verify

Check if Vulnerable:

Open SumatraPDF, go to Help > About. If version is between 3.5.0 and 3.5.2 inclusive, system is vulnerable.

Check Version:

sumatrapdf.exe --version

Verify Fix Applied:

After updating, check Help > About shows version 3.5.3 or higher. Verify update mechanism now validates TLS certificates and installer signatures.

📡 Detection & Monitoring

Log Indicators:

  • Unusual network connections from SumatraPDF to non-official domains
  • Failed certificate validation attempts in system logs

Network Indicators:

  • HTTP traffic to update servers without TLS hostname validation
  • Download of executables from unexpected sources by SumatraPDF process

SIEM Query:

process_name="SumatraPDF.exe" AND (destination_ip NOT IN [official_update_servers] OR network_protocol="http")

🔗 References

📤 Share & Export