CVE-2025-66494

7.8 HIGH

📋 TL;DR

A use-after-free vulnerability in Foxit PDF Reader's PDF parsing allows remote code execution when opening malicious PDF files. This affects Windows users running vulnerable versions of Foxit PDF Reader. Attackers could exploit this by tricking users into opening specially crafted PDF documents.

💻 Affected Systems

Products:
  • Foxit PDF Reader
Versions: Before 2025.2.1, 14.0.1, and 13.2.1
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects Windows versions of Foxit PDF Reader. Other Foxit products and platforms are not affected.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote attacker gains full control of the victim's system through arbitrary code execution with the user's privileges.

🟠

Likely Case

Malicious actor delivers weaponized PDF via email or web download, compromising the target system for data theft or further network penetration.

🟢

If Mitigated

With proper controls like application whitelisting and least privilege, impact is limited to the user's context without lateral movement.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires user interaction to open malicious PDF. No public exploit code is currently available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2025.2.1, 14.0.1, or 13.2.1 depending on installed version

Vendor Advisory: https://www.foxit.com/support/security-bulletins.html

Restart Required: No

Instructions:

1. Open Foxit PDF Reader. 2. Go to Help > Check for Updates. 3. Follow prompts to install latest version. 4. Alternatively, download and install fixed version from Foxit website.

🔧 Temporary Workarounds

Disable JavaScript in Foxit

windows

Prevents JavaScript-based exploitation vectors in PDF files

Open Foxit > File > Preferences > JavaScript > Uncheck 'Enable JavaScript'

Use Protected View

windows

Open PDFs in sandboxed mode to limit potential damage

Open Foxit > File > Preferences > Trust Manager > Check 'Enable Safe Reading Mode'

🧯 If You Can't Patch

  • Use alternative PDF readers that are not vulnerable
  • Block PDF file downloads at network perimeter or email gateway

🔍 How to Verify

Check if Vulnerable:

Check Foxit version: Open Foxit > Help > About Foxit Reader. If version is before 2025.2.1, 14.0.1, or 13.2.1, system is vulnerable.

Check Version:

wmic product where "name like 'Foxit%Reader%'" get version

Verify Fix Applied:

Verify installed version is 2025.2.1, 14.0.1, or 13.2.1 or later via Help > About Foxit Reader.

📡 Detection & Monitoring

Log Indicators:

  • Foxit Reader crash logs with memory access violations
  • Unexpected child processes spawned from Foxit Reader

Network Indicators:

  • PDF downloads from suspicious sources
  • Outbound connections from Foxit Reader process

SIEM Query:

process_name:"FoxitReader.exe" AND (event_id:1000 OR event_id:1001) AND exception_code:0xc0000005

🔗 References

📤 Share & Export