An issue was discovered in Foxit PDF and Editor for Windows before 13.2 and 2025 before 2025.2. Opening a malicious PDF containing a crafted JavaScript call to search.query() with a crafted cDIPath parameter (e.g., "/") may cause an out-of-bounds read in internal path-parsing logic, potentially leading to information disclosure or memory corruption.
Metrics
Affected Vendors & Products
References
| Link | Providers |
|---|---|
| https://www.foxit.com/support/security-bulletins.html |
|
History
Thu, 11 Dec 2025 21:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Foxit
Foxit pdf Editor Microsoft Microsoft windows |
|
| Vendors & Products |
Foxit
Foxit pdf Editor Microsoft Microsoft windows |
Thu, 11 Dec 2025 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-125 | |
| Metrics |
cvssV3_1
|
Thu, 11 Dec 2025 15:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An issue was discovered in Foxit PDF and Editor for Windows before 13.2 and 2025 before 2025.2. Opening a malicious PDF containing a crafted JavaScript call to search.query() with a crafted cDIPath parameter (e.g., "/") may cause an out-of-bounds read in internal path-parsing logic, potentially leading to information disclosure or memory corruption. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published: 2025-12-11T00:00:00.000Z
Updated: 2025-12-11T20:12:59.723Z
Reserved: 2025-08-12T00:00:00.000Z
Link: CVE-2025-55307
Updated: 2025-12-11T20:12:18.690Z
Status : Received
Published: 2025-12-11T16:16:25.053
Modified: 2025-12-11T21:15:50.480
Link: CVE-2025-55307
No data.