Foxit PDF Reader/Editor Exploit

HIGH (7.8) No Patch

Threat Intelligence

Low Risk
🔍 Detection Tools: None available in major open-source tools
⚔️ Exploit Availability: No public exploits found

How we test →

What is it?

Foxit PDF Reader and Editor are software tools used for viewing, editing, and creating PDF documents. The vulnerability in question is a use-after-free bug that occurs when opening a PDF containing specially crafted JavaScript code. This allows an attacker to execute arbitrary code on the user's system.

Am I affected?

You're affected if you use Foxit PDF Reader or Editor versions 2025.2.1,14.0.1 and 13.2.1 on Windows. To check your version, run the following command: foxitpdfreader --version or foxitpdfeditor --version

Note that this vulnerability is specific to Foxit's PDF Reader and Editor software, not other PDF viewers or editors.

Affected Products

Foxit Software / Foxit PDF Reader/Editor

How to fix

To fix this issue:

  • Upgrade to a newer version of Foxit PDF Reader or Editor (2025.3.0 or later) from the official Foxit website: https://www.foxit.com/download.html
  • Immediate mitigations:
    • Disable JavaScript execution in Foxit PDF Reader and Editor settings.
    • Use a different PDF viewer or editor until you can upgrade to a newer version.

References