7.8

CVE-2025-55313

An issue was discovered in Foxit PDF and Editor for Windows and macOS before 13.2 and 2025 before 2025.2. They allow potential arbitrary code execution when processing crafted PDF files. The vulnerability stems from insufficient handling of memory allocation failures after assigning an extremely large value to a form field's charLimit property via JavaScript. This can result in memory corruption and may allow an attacker to execute arbitrary code by persuading a user to open a malicious file.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung. Login Login
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
FoxitPdf Editor Version >= 2023.1.0.15510 <= 2023.3.0.23028
   MicrosoftWindows Version-
FoxitPdf Editor Version >= 2024.1.0.23997 <= 2024.4.1.27687
   MicrosoftWindows Version-
FoxitPdf Editor Version2025.1.0.27937
   MicrosoftWindows Version-
FoxitPdf Reader Version <= 2025.1.0.27937
   MicrosoftWindows Version-
FoxitPdf Editor Version <= 13.1.7.63027
   ApplemacOS Version-
FoxitPdf Editor Version >= 2023.1.0.55583 <= 2023.3.0.63083
   ApplemacOS Version-
FoxitPdf Editor Version >= 2024.1.0.63682 <= 2024.4.1.66479
   ApplemacOS Version-
FoxitPdf Editor Version2025.1.0.66692
   ApplemacOS Version-
FoxitPdf Reader Version <= 2025.1.0.66692
   ApplemacOS Version-
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.01% 0.015
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
134c704f-9b21-4f2e-91b3-4a467353bcc0 7.8 1.8 5.9
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CWE-94 Improper Control of Generation of Code ('Code Injection')

The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.