
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2025-8454 affects uscan, a tool included in devscripts package that scans/watches upstream sources for new releases of software. The vulnerability was discovered in August 2025, where uscan skips OpenPGP verification if the upstream source is already downloaded from a previous run, even if the verification failed previously. This vulnerability affects devscripts version 2.25.15 and earlier versions (NVD, Debian Bug).
The vulnerability is classified under CWE-347 (Improper Verification of Cryptographic Signature). The issue has a CVSS v3.1 base score of 9.8 (Critical) with the vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H. The vulnerability occurs when uscan keeps the downloaded file after a failed signature verification, which allows subsequent runs to skip the OpenPGP verification entirely (Ubuntu Security, NVD).
The vulnerability allows potential bypass of cryptographic verification mechanisms. When signature verification fails, the downloaded file remains in place and subsequent runs skip the verification, potentially allowing the use of malicious or compromised source files in package builds (Debian Bug).
Two potential fixes have been proposed: either store the downloaded file under a temporary name until signature verification passes, or modify uscan to not skip verification on subsequent runs. A patch has been submitted that implements the second approach by removing the verification skip behavior (Debian Bug).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."