CVE-2025-65083
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-11-17

Last updated on: 2025-11-17

Assigner: MITRE

Description
GoSign Desktop through 2.4.1 disables TLS certificate validation when configured to use a proxy server. This can be problematic if the GoSign Desktop user selects an arbitrary proxy server without consideration of whether outbound HTTPS connections from the proxy server to Internet servers succeed even for untrusted or invalid server certificates. In this scenario (which is outside of the product's design objectives), integrity protection could be bypassed. In typical cases of a proxy server for outbound HTTPS traffic from an enterprise, those connections would not succeed. (Admittedly, the usual expectation is that a client application is configured to trust an enterprise CA and does not set SSL_VERIFY_NONE.) Also, it is of course unsafe to place ~/.gosign in the home directory of an untrusted user and then have other users execute downloaded files.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-11-17
Last Modified
2025-11-17
Generated
2026-05-07
AI Q&A
2025-11-17
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
gosign gosign_desktop 2.4.1
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-295 The product does not validate, or incorrectly validates, a certificate.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability occurs in GoSign Desktop versions up to 2.4.1, where TLS certificate validation is disabled when the software is configured to use a proxy server. This means that if a user selects an arbitrary proxy server, the software may accept HTTPS connections even if the server certificates are untrusted or invalid. This can allow an attacker to bypass integrity protection, potentially compromising secure communications.


How can this vulnerability impact me? :

The vulnerability can impact you by allowing an attacker controlling or intercepting the proxy server to bypass TLS certificate validation, potentially leading to integrity issues in your HTTPS connections. This could result in undetected man-in-the-middle attacks or tampering with data transmitted through the proxy. Additionally, if the ~/.gosign directory is placed in an untrusted user's home directory, other users executing downloaded files could be exposed to further risks.


What immediate steps should I take to mitigate this vulnerability?

To mitigate this vulnerability, avoid configuring GoSign Desktop to use an arbitrary or untrusted proxy server. Ensure that the proxy server properly validates TLS certificates for outbound HTTPS connections. Additionally, do not place the ~/.gosign directory in the home directory of untrusted users to prevent execution of potentially unsafe downloaded files by other users.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart