CVE-2025-66501

6.3 MEDIUM

📋 TL;DR

A stored cross-site scripting vulnerability in Foxit eSign's pdfonline.foxit.com allows attackers to inject malicious scripts via the Identity 'First Name' field. When predefined text is used or document properties are viewed, the script executes in victims' browsers. This affects users of Foxit eSign's online platform who create or view documents with predefined text.

💻 Affected Systems

Products:
  • Foxit eSign
Versions: All versions prior to patch
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Specifically affects the Predefined Text feature in the Foxit eSign section of pdfonline.foxit.com.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could steal session cookies, redirect users to malicious sites, perform actions on behalf of authenticated users, or install malware through drive-by downloads.

🟠

Likely Case

Session hijacking leading to unauthorized access to documents, credential theft, or defacement of document interfaces.

🟢

If Mitigated

Limited impact with proper input validation and output encoding; scripts would be sanitized before execution.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires ability to create or modify predefined text fields, typically requiring some level of access to the eSign platform.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Foxit security bulletins for specific version

Vendor Advisory: https://www.foxit.com/support/security-bulletins.html

Restart Required: No

Instructions:

1. Visit Foxit security bulletins page
2. Identify patch for CVE-2025-66501
3. Apply update to Foxit eSign platform
4. Verify fix by testing predefined text functionality

🔧 Temporary Workarounds

Disable Predefined Text Feature

all

Temporarily disable the Predefined Text functionality in Foxit eSign until patch is applied.

Input Validation Rules

all

Implement server-side input validation to reject script tags and special characters in First Name field.

🧯 If You Can't Patch

  • Implement Content Security Policy (CSP) headers to restrict script execution
  • Enable browser XSS protection headers and sanitize all user inputs server-side

🔍 How to Verify

Check if Vulnerable:

Test by entering <script>alert('XSS')</script> in First Name field of Predefined Text feature and check if script executes when viewing document properties.

Check Version:

Check Foxit eSign version in platform settings or contact Foxit support.

Verify Fix Applied:

Repeat vulnerability test; script should be sanitized and not execute. Check that special characters are properly encoded in output.

📡 Detection & Monitoring

Log Indicators:

  • Unusual length or special characters in First Name fields
  • Multiple failed validation attempts on predefined text inputs

Network Indicators:

  • Unexpected script tags in HTTP POST requests to eSign endpoints
  • External script loads from document properties pages

SIEM Query:

source="foxit_esign" AND (http_method="POST" AND uri_path="*predefined*" AND (request_body="*<script>*" OR request_body="*javascript:*"))

🔗 References

📤 Share & Export