CVE-2026-1591

6.3 MEDIUM

📋 TL;DR

Foxit PDF Editor Cloud (pdfonline) has a stored cross-site scripting vulnerability in its file upload feature. Malicious usernames embedded in uploaded files aren't properly escaped, allowing attackers to execute arbitrary JavaScript when administrators view the upload list. This affects all users of pdfonline.foxit.com before February 3, 2026.

💻 Affected Systems

Products:
  • Foxit PDF Editor Cloud (pdfonline)
Versions: All versions before 2026-02-03
Operating Systems: Any
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects the cloud-hosted pdfonline.foxit.com service, not desktop versions of Foxit PDF Editor.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could steal administrator session cookies, perform actions as administrators, deface the application, or redirect users to malicious sites, potentially leading to complete account compromise and data theft.

🟠

Likely Case

Attackers would typically use this to steal session cookies or credentials from administrators viewing the upload list, gaining unauthorized access to the PDF Editor Cloud platform.

🟢

If Mitigated

With proper input validation and output encoding, the malicious JavaScript would be rendered harmless as plain text rather than executed.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires file upload access and an administrator to view the upload list. The vulnerability is straightforward to exploit once discovered.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2026-02-03 or later

Vendor Advisory: https://www.foxit.com/support/security-bulletins.html

Restart Required: No

Instructions:

1. Access the Foxit PDF Editor Cloud admin panel. 2. Check current version in system settings. 3. If before 2026-02-03, contact Foxit support for update. 4. Verify update to 2026-02-03 or later.

🔧 Temporary Workarounds

Disable file uploads

all

Temporarily disable the file upload feature until patched

Content Security Policy

all

Implement strict Content Security Policy headers to block inline JavaScript execution

Content-Security-Policy: script-src 'self'

🧯 If You Can't Patch

  • Implement WAF rules to block XSS payloads in file upload metadata
  • Restrict file upload permissions to trusted users only and monitor upload logs

🔍 How to Verify

Check if Vulnerable:

Check if your pdfonline.foxit.com instance is dated before 2026-02-03 in the admin panel or system info

Check Version:

Check admin panel system information or contact Foxit support

Verify Fix Applied:

Confirm version is 2026-02-03 or later and test file upload with XSS payloads to ensure they're properly escaped

📡 Detection & Monitoring

Log Indicators:

  • Unusual file uploads with script tags in metadata
  • Multiple failed upload attempts with special characters

Network Indicators:

  • HTTP requests with script payloads in file upload parameters

SIEM Query:

source="pdfonline" AND (event="file_upload" AND (message="*<script>*" OR message="*javascript:*"))

🔗 References

📤 Share & Export