CVE-2025-55307

3.3 LOW

📋 TL;DR

This vulnerability in Foxit PDF software allows attackers to trigger an out-of-bounds read by tricking users into opening malicious PDF files containing crafted JavaScript. The flaw could lead to information disclosure or memory corruption. Users of Foxit PDF Reader and Editor on Windows are affected.

💻 Affected Systems

Products:
  • Foxit PDF Reader
  • Foxit PDF Editor
Versions: Foxit PDF Reader/Editor versions before 13.2 and 2025 versions before 2025.2
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Requires JavaScript to be enabled (default in Foxit)

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Memory corruption leading to arbitrary code execution or sensitive information disclosure from process memory

🟠

Likely Case

Application crash or limited information disclosure from memory

🟢

If Mitigated

No impact if JavaScript execution is disabled or malicious PDFs are blocked

🌐 Internet-Facing: MEDIUM - Requires user interaction to open malicious PDF, but PDFs are commonly shared via email/web
🏢 Internal Only: MEDIUM - Same attack vector applies internally via shared documents

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires user interaction to open malicious PDF and JavaScript execution enabled

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Foxit PDF Reader/Editor 13.2 or 2025.2

Vendor Advisory: https://www.foxit.com/support/security-bulletins.html

Restart Required: Yes

Instructions:

1. Download latest version from Foxit website 2. Run installer 3. Restart system 4. Verify version in Help > About

🔧 Temporary Workarounds

Disable JavaScript in Foxit

windows

Prevents JavaScript execution in PDFs, blocking the attack vector

File > Preferences > JavaScript > Uncheck 'Enable JavaScript'

Use alternative PDF viewer

windows

Temporarily use Windows built-in PDF viewer or other unaffected software

🧯 If You Can't Patch

  • Block PDF files at network perimeter/email gateway
  • Educate users not to open PDFs from untrusted sources

🔍 How to Verify

Check if Vulnerable:

Check Foxit version in Help > About menu

Check Version:

Not applicable - check via GUI in Help > About

Verify Fix Applied:

Confirm version is 13.2 or higher (or 2025.2 for 2025 series)

📡 Detection & Monitoring

Log Indicators:

  • Foxit crash logs
  • Windows Application Error events with Foxit process

Network Indicators:

  • PDF downloads from suspicious sources

SIEM Query:

EventID=1000 OR EventID=1001 AND ProcessName LIKE '%foxit%'

🔗 References

📤 Share & Export