CVE-2025-55309

6.7 MEDIUM

📋 TL;DR

A use-after-free vulnerability in Foxit PDF and Editor allows memory corruption or crashes when processing malicious PDF files containing specific JavaScript. Attackers could exploit this by tricking users into opening crafted PDFs. Affected users include anyone running vulnerable Foxit software versions on Windows or macOS.

💻 Affected Systems

Products:
  • Foxit PDF Reader
  • Foxit PDF Editor
Versions: All versions before 13.2 and 2025 before 2025.2
Operating Systems: Windows, macOS
Default Config Vulnerable: ⚠️ Yes
Notes: Requires JavaScript enabled in PDFs (default setting).

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to full system compromise if memory corruption is weaponized.

🟠

Likely Case

Application crashes (denial of service) and potential information disclosure from memory corruption.

🟢

If Mitigated

Limited to application crashes if exploit fails to achieve code execution.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires user interaction (opening malicious PDF). JavaScript execution is typically enabled by default.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 13.2 or 2025.2

Vendor Advisory: https://www.foxit.com/support/security-bulletins.html

Restart Required: Yes

Instructions:

1. Open Foxit software. 2. Go to Help > Check for Updates. 3. Follow prompts to install version 13.2 or 2025.2. 4. Restart the application.

🔧 Temporary Workarounds

Disable JavaScript in PDFs

all

Prevents the malicious JavaScript from executing.

In Foxit: File > Preferences > JavaScript > Uncheck 'Enable JavaScript'

Use Protected View

all

Opens PDFs in a sandboxed environment.

In Foxit: File > Preferences > Trust Manager > Check 'Enable Safe Reading Mode'

🧯 If You Can't Patch

  • Block PDF files from untrusted sources at network perimeter.
  • Educate users to avoid opening PDFs from unknown senders.

🔍 How to Verify

Check if Vulnerable:

Check Foxit version in Help > About. If version is below 13.2 (for older series) or below 2025.2 (for 2025 series), it's vulnerable.

Check Version:

On Windows: wmic product where name like "Foxit%" get version. On macOS: /Applications/Foxit\ PDF\ Editor.app/Contents/Info.plist | grep -A1 CFBundleShortVersionString

Verify Fix Applied:

Confirm version is 13.2 or higher (or 2025.2 or higher for 2025 series) in Help > About.

📡 Detection & Monitoring

Log Indicators:

  • Application crash logs from Foxit processes
  • Unexpected JavaScript execution errors in PDFs

Network Indicators:

  • Inbound PDF files from untrusted sources
  • Outbound connections after PDF opening

SIEM Query:

source="*foxit*" AND (event_type="crash" OR message="*JavaScript*" OR message="*memory*corruption*")

🔗 References

📤 Share & Export