Yes, this is true.
While this is technically true, the adversary would need to be "in the middle" during the initial key exchange (during creation and copying of the openvpn configuration file) in order to substitute public keys with their own. Once the OpenVPN tunnel is configured, each end...