CVE-2025-59802

7.5 HIGH

📋 TL;DR

This vulnerability in Foxit PDF Editor and Reader allows attackers to modify the visual content of digitally signed PDFs without invalidating the signature. By exploiting Optional Content Groups (OCG) that aren't included in signature computations, attackers can change what users see after signing. This affects all users who rely on Foxit's digital signature verification for document integrity.

💻 Affected Systems

Products:
  • Foxit PDF Editor
  • Foxit PDF Reader
Versions: All versions before 2025.2.1, 14.0.1, and 13.2.1
Operating Systems: Windows, macOS, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability requires PDFs with digital signatures and OCG content; exploitation needs JavaScript or PDF triggers enabled.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could modify critical contract terms, financial amounts, or legal clauses in signed documents while signatures remain valid, leading to fraud, legal disputes, or unauthorized transactions.

🟠

Likely Case

Malicious actors could subtly alter document content to mislead recipients about signed agreements, potentially enabling phishing, misinformation, or minor fraud.

🟢

If Mitigated

With proper controls, organizations could detect anomalous PDF behavior through monitoring, though signature verification would still appear valid.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires crafting malicious PDFs with OCG and JavaScript/triggers; attackers need to deliver PDFs to targets.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2025.2.1, 14.0.1, or 13.2.1

Vendor Advisory: https://www.foxit.com/support/security-bulletins.html

Restart Required: Yes

Instructions:

1. Download latest version from Foxit website. 2. Run installer. 3. Restart system. 4. Verify version in Help > About.

🔧 Temporary Workarounds

Disable JavaScript in Foxit

all

Prevents JavaScript-based OCG manipulation triggers

Open Foxit > File > Preferences > JavaScript > Uncheck 'Enable JavaScript'

Use alternative PDF viewer for signed documents

all

Temporarily use unaffected PDF software for signature verification

🧯 If You Can't Patch

  • Implement strict PDF attachment filtering and sandboxing for all incoming documents
  • Train users to verify document integrity through secondary channels when signatures are critical

🔍 How to Verify

Check if Vulnerable:

Check Foxit version in Help > About; if below 2025.2.1, 14.0.1, or 13.2.1, you're vulnerable.

Check Version:

On Windows: wmic product where name="Foxit PDF Editor" get version

Verify Fix Applied:

Confirm version shows 2025.2.1, 14.0.1, or 13.2.1 in Help > About.

📡 Detection & Monitoring

Log Indicators:

  • Multiple PDF signature verification events from same document
  • Foxit JavaScript execution errors

Network Indicators:

  • Unusual PDF downloads from untrusted sources

SIEM Query:

source="foxit" AND (event="javascript_execution" OR event="signature_verification")

🔗 References

📤 Share & Export