CVE-2025-55310

7.3 HIGH

📋 TL;DR

This vulnerability allows attackers who can modify or replace static HTML files used by Foxit PDF's StartPage feature to inject malicious content that loads automatically when the application starts. This affects Foxit PDF and Editor users on Windows and macOS with vulnerable versions. Successful exploitation could lead to information disclosure or unauthorized data access.

💻 Affected Systems

Products:
  • Foxit PDF Reader
  • Foxit PDF Editor
Versions: All versions before 13.2 and 2025 before 2025.2
Operating Systems: Windows, macOS
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects installations with StartPage feature enabled (default setting).

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise through malicious code execution, credential theft, and lateral movement within the network.

🟠

Likely Case

Information disclosure through malicious scripts capturing user data or system information when Foxit PDF starts.

🟢

If Mitigated

Limited impact with proper file integrity monitoring and restricted file permissions preventing HTML file modification.

🌐 Internet-Facing: MEDIUM - Requires local file system access or network share compromise to modify HTML files.
🏢 Internal Only: HIGH - Internal attackers with file write permissions to Foxit installation directories can exploit this easily.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires write access to Foxit installation directory or ability to replace HTML files through other means.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 13.2 or 2025.2

Vendor Advisory: https://www.foxit.com/support/security-bulletins.html

Restart Required: Yes

Instructions:

1. Download latest version from Foxit website. 2. Run installer. 3. Restart system. 4. Verify version in Help > About.

🔧 Temporary Workarounds

Disable StartPage Feature

all

Prevents loading of potentially malicious HTML content on application startup

Open Foxit > File > Preferences > General > Uncheck 'Show StartPage on startup'

Restrict File Permissions

windows

Prevent unauthorized modification of HTML files in Foxit installation directory

icacls "C:\Program Files\Foxit Software\Foxit PDF Reader\StartPage" /deny Users:(W)
chmod 755 /Applications/Foxit*.app/Contents/Resources/StartPage

🧯 If You Can't Patch

  • Implement strict file integrity monitoring on Foxit installation directories
  • Use application whitelisting to prevent execution of modified Foxit binaries

🔍 How to Verify

Check if Vulnerable:

Check Foxit version in Help > About. If version is below 13.2 (for older versions) or below 2025.2 (for 2025 versions), system is vulnerable.

Check Version:

On Windows: wmic product where name="Foxit PDF Reader" get version. On macOS: mdls -name kMDItemVersion /Applications/Foxit*.app

Verify Fix Applied:

Confirm version is 13.2 or higher (or 2025.2 or higher for 2025 versions) in Help > About.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected file modifications in Foxit installation directories
  • Process creation events from modified Foxit executables

Network Indicators:

  • Unusual outbound connections from Foxit process shortly after startup

SIEM Query:

EventID=4663 OR EventID=4656 AND ObjectName LIKE "%Foxit%StartPage%" AND AccessMask=0x2

🔗 References

📤 Share & Export