CVE-2025-32451
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-08-13

Last updated on: 2025-11-03

Assigner: Talos

Description
A memory corruption vulnerability exists in Foxit Reader 2025.1.0.27937 due to the use of an uninitialized pointer. A specially crafted Javascript code inside a malicious PDF document can trigger this vulnerability, which can lead to memory corruption and result in arbitrary code execution. An attacker needs to trick the user into opening the malicious file to trigger this vulnerability. Exploitation is also possible if a user visits a specially crafted, malicious site if the browser plugin extension is enabled.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-08-13
Last Modified
2025-11-03
Generated
2026-05-07
AI Q&A
2025-08-13
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
foxit pdf_reader 2025.1.0.27937
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-824 The product accesses or uses a pointer that has not been initialized.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is a memory corruption issue in Foxit Reader 2025.1.0.27937 caused by the use of an uninitialized pointer. It can be triggered by specially crafted Javascript code embedded in a malicious PDF file. When a user opens such a file, or visits a malicious website if the Foxit Reader browser plugin is enabled, the vulnerability can lead to memory corruption and allow an attacker to execute arbitrary code.


How can this vulnerability impact me? :

If exploited, this vulnerability can allow an attacker to execute arbitrary code on your system. This means the attacker could potentially take control of your computer, steal data, install malware, or perform other malicious actions without your consent.


What immediate steps should I take to mitigate this vulnerability?

To mitigate this vulnerability, avoid opening PDF files from untrusted sources and disable the Foxit Reader browser plugin extension if enabled. Ensure that users are aware not to open suspicious PDF documents or visit untrusted websites that may contain malicious PDFs. Applying any available updates or patches from Foxit for version 2025.1.0.27937 is also recommended once released.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart