CVE-2025-66495

7.8 HIGH

📋 TL;DR

A use-after-free vulnerability in Foxit PDF Reader's annotation handling allows remote code execution when opening malicious PDF files containing crafted JavaScript. This affects Windows and MacOS users running vulnerable versions of Foxit PDF Reader. Attackers could exploit this to take control of affected systems.

💻 Affected Systems

Products:
  • Foxit PDF Reader
Versions: Versions before 2025.2.1, 14.0.1, and 13.2.1
Operating Systems: Windows, MacOS
Default Config Vulnerable: ⚠️ Yes
Notes: Requires JavaScript to be enabled (default setting). Opening PDF files from untrusted sources triggers the vulnerability.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote attacker gains full system control through arbitrary code execution, potentially leading to data theft, ransomware deployment, or lateral movement within the network.

🟠

Likely Case

Targeted attacks against organizations using spear-phishing with malicious PDF attachments, resulting in initial access and potential privilege escalation.

🟢

If Mitigated

Limited impact with proper application whitelisting, network segmentation, and user awareness training preventing successful exploitation.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires user interaction to open a malicious PDF file. JavaScript execution is necessary for the vulnerability to trigger.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2025.2.1, 14.0.1, or 13.2.1 depending on product line

Vendor Advisory: https://www.foxit.com/support/security-bulletins.html

Restart Required: Yes

Instructions:

1. Open Foxit PDF Reader
2. Go to Help > Check for Updates
3. Follow prompts to install latest version
4. Restart computer after installation

🔧 Temporary Workarounds

Disable JavaScript in Foxit Reader

windows

Prevents JavaScript execution in PDF files, which blocks exploitation of this vulnerability

Open Foxit Reader > File > Preferences > JavaScript > Uncheck 'Enable JavaScript'

Use alternative PDF viewer

all

Temporarily use built-in PDF viewers or other applications until patching is complete

🧯 If You Can't Patch

  • Implement application whitelisting to block unauthorized PDF readers
  • Deploy network segmentation to limit lateral movement from compromised systems

🔍 How to Verify

Check if Vulnerable:

Check Foxit Reader version in Help > About. If version is below 2025.2.1, 14.0.1, or 13.2.1, system is vulnerable.

Check Version:

On Windows: wmic product where name="Foxit Reader" get version

Verify Fix Applied:

Verify version is 2025.2.1, 14.0.1, or 13.2.1 or higher in Help > About.

📡 Detection & Monitoring

Log Indicators:

  • Foxit Reader crash logs with memory access violations
  • Windows Event Logs showing Foxit process termination with exception codes

Network Indicators:

  • Unusual outbound connections from Foxit Reader process
  • PDF file downloads from suspicious sources

SIEM Query:

process_name:"FoxitReader.exe" AND (event_id:1000 OR exception_code:0xc0000005)

🔗 References

📤 Share & Export