CVE-2025-55313

7.8 HIGH

📋 TL;DR

This vulnerability in Foxit PDF software allows arbitrary code execution when processing malicious PDF files. Attackers can exploit memory corruption by manipulating form field properties via JavaScript. Users of affected Foxit versions on Windows and macOS are at risk.

💻 Affected Systems

Products:
  • Foxit PDF Reader
  • Foxit PDF Editor
Versions: All versions before 13.2 and 2025 before 2025.2
Operating Systems: Windows, macOS
Default Config Vulnerable: ⚠️ Yes
Notes: All default installations are vulnerable. JavaScript must be enabled (default setting) for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with attacker gaining complete control over the victim's computer, enabling data theft, ransomware deployment, or persistent backdoor installation.

🟠

Likely Case

Malware installation leading to data exfiltration, credential theft, or system disruption through crafted PDF files delivered via phishing.

🟢

If Mitigated

Limited impact with proper security controls, potentially resulting in application crash but no code execution due to memory protections.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires user interaction to open malicious PDF but no authentication. Memory corruption vulnerabilities in PDF readers are commonly weaponized.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version 13.2 or 2025.2

Vendor Advisory: https://www.foxit.com/support/security-bulletins.html

Restart Required: Yes

Instructions:

1. Open Foxit software
2. Navigate to Help > Check for Updates
3. Follow prompts to install version 13.2 or 2025.2
4. Restart computer after installation

🔧 Temporary Workarounds

Disable JavaScript in Foxit

all

Prevents exploitation by disabling JavaScript execution in PDF files

Open Foxit > File > Preferences > JavaScript > Uncheck 'Enable JavaScript'

Use alternative PDF viewer

all

Temporarily use different PDF software until patched

🧯 If You Can't Patch

  • Block PDF files from untrusted sources at email gateways and web proxies
  • Implement application whitelisting to prevent unauthorized executables

🔍 How to Verify

Check if Vulnerable:

Check Foxit version in Help > About. If version is below 13.2 (for older versions) or below 2025.2 (for 2025 versions), system is vulnerable.

Check Version:

On Windows: wmic product where name="Foxit" get version
On macOS: /Applications/Foxit*.app/Contents/Info.plist | grep -A1 CFBundleVersion

Verify Fix Applied:

Confirm version shows 13.2 or higher, or 2025.2 or higher in Help > About.

📡 Detection & Monitoring

Log Indicators:

  • Foxit process crashes with memory access violations
  • Unusual JavaScript execution in PDF files
  • Large memory allocation failures in application logs

Network Indicators:

  • PDF downloads from suspicious sources
  • Unusual outbound connections after PDF opening

SIEM Query:

process_name:"Foxit*.exe" AND (event_id:1000 OR event_id:1001) OR file_extension:".pdf" AND process_name:"Foxit*"

🔗 References

📤 Share & Export