CVE-2025-66522

6.3 MEDIUM

📋 TL;DR

A stored cross-site scripting vulnerability in Foxit PDF Editor Cloud allows attackers to inject malicious scripts into the Digital IDs Common Name field. When users view affected PDFs or access the Digital IDs dialog, the scripts execute in their browser context. This affects all users of Foxit PDF Editor Cloud who process PDFs with Digital IDs.

💻 Affected Systems

Products:
  • Foxit PDF Editor Cloud
Versions: All versions prior to patch
Operating Systems: All platforms with web browser access
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects the cloud version at pdfonline.foxit.com, not desktop applications. Requires user interaction to view affected PDFs or access Digital IDs dialog.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could steal session cookies, perform actions as the victim user, redirect to malicious sites, or install malware through drive-by downloads.

🟠

Likely Case

Session hijacking, credential theft, or unauthorized actions within the Foxit Cloud application using the victim's permissions.

🟢

If Mitigated

Limited impact if proper content security policies are enforced and user sessions have short timeouts with strict validation.

🌐 Internet-Facing: HIGH - The vulnerability exists in a cloud-based service accessible from the internet, making it directly exploitable by external attackers.
🏢 Internal Only: MEDIUM - Internal users could still be targeted through phishing or compromised PDFs, but requires initial access to the internal network.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires the attacker to create or modify a PDF with malicious Digital ID content and convince the victim to open it in Foxit PDF Editor Cloud.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check vendor advisory for specific version

Vendor Advisory: https://www.foxit.com/support/security-bulletins.html

Restart Required: No

Instructions:

1. Visit Foxit security bulletins page. 2. Identify the patch for CVE-2025-66522. 3. Apply the cloud service update as per Foxit instructions. 4. Verify the fix by testing Digital IDs functionality.

🔧 Temporary Workarounds

Disable Digital IDs functionality

all

Temporarily disable or restrict access to Digital IDs features in Foxit PDF Editor Cloud

Implement Content Security Policy

all

Add strict CSP headers to prevent script execution from untrusted sources

Content-Security-Policy: default-src 'self'; script-src 'self'

🧯 If You Can't Patch

  • Implement web application firewall rules to block malicious script patterns in Digital ID fields
  • Educate users to avoid opening PDFs from untrusted sources in Foxit PDF Editor Cloud

🔍 How to Verify

Check if Vulnerable:

Test by creating a Digital ID with <script>alert('XSS')</script> in Common Name field and checking if script executes when viewing PDF

Check Version:

Check Foxit Cloud interface for version information or contact Foxit support

Verify Fix Applied:

Repeat the vulnerability test after patch - script should be properly encoded and not execute

📡 Detection & Monitoring

Log Indicators:

  • Unusual Digital ID creation/modification patterns
  • Multiple failed script execution attempts in web logs

Network Indicators:

  • Outbound connections to suspicious domains after PDF viewing
  • Unusual data exfiltration patterns

SIEM Query:

source="foxit-cloud" AND (event="digital_id_created" OR event="pdf_viewed") AND (common_name CONTAINS "<script>" OR common_name CONTAINS "javascript:")

🔗 References

📤 Share & Export