CVE-2025-55312

7.8 HIGH

📋 TL;DR

A memory corruption vulnerability in Foxit PDF and Editor allows attackers to execute arbitrary code by exploiting improper state updates when deleting PDF pages via JavaScript. This affects Windows users running vulnerable versions of Foxit software. Successful exploitation could lead to complete system compromise.

💻 Affected Systems

Products:
  • Foxit PDF Reader
  • Foxit PDF Editor
Versions: Foxit PDF Reader/Editor versions before 13.2 and 2025 versions before 2025.2
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Requires JavaScript execution in PDFs, which is enabled by default in Foxit products.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution with SYSTEM privileges leading to complete system takeover, data exfiltration, and lateral movement.

🟠

Likely Case

Application crashes and denial of service; code execution possible with sophisticated exploitation.

🟢

If Mitigated

Application crashes only, with memory corruption contained by modern exploit mitigations.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires user interaction to open a malicious PDF file. JavaScript execution in PDFs provides the attack vector.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Foxit PDF Reader/Editor 13.2 or 2025.2

Vendor Advisory: https://www.foxit.com/support/security-bulletins.html

Restart Required: Yes

Instructions:

1. Download latest version from Foxit website
2. Run installer with administrative privileges
3. Restart system after installation completes

🔧 Temporary Workarounds

Disable JavaScript in Foxit

windows

Prevents JavaScript execution in PDF files, blocking the attack vector

Open Foxit > File > Preferences > JavaScript > Uncheck 'Enable JavaScript'

Use Protected View

windows

Open PDFs in restricted mode to limit potential damage

Open Foxit > File > Preferences > Trust Manager > Check 'Enable Safe Reading Mode'

🧯 If You Can't Patch

  • Block PDF files at network perimeter using content filtering
  • Use application whitelisting to prevent unauthorized Foxit execution

🔍 How to Verify

Check if Vulnerable:

Check Foxit version via Help > About. If version is below 13.2 (for v13) or below 2025.2 (for v2025), system is vulnerable.

Check Version:

wmic product where "name like 'Foxit%'" get version

Verify Fix Applied:

Confirm version is 13.2 or higher (for v13) or 2025.2 or higher (for v2025) in Help > About.

📡 Detection & Monitoring

Log Indicators:

  • Foxit application crashes with memory access violations
  • Unexpected JavaScript execution in PDF files
  • Process creation from Foxit with unusual command lines

Network Indicators:

  • PDF file downloads from untrusted sources
  • HTTP requests to suspicious domains following PDF opening

SIEM Query:

source="windows" AND (process_name="Foxit*.exe" AND (event_id=1000 OR event_id=1001)) OR (file_name="*.pdf" AND process_name="Foxit*.exe")

🔗 References

📤 Share & Export