CVE-2025-9326
BaseFortify
Publication date: 2025-09-02
Last updated on: 2025-09-08
Assigner: Zero Day Initiative
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| foxit | pdf_editor | to 13.1.7.23637 (inc) |
| foxit | pdf_editor | From 2023.1.0.15510 (inc) to 2023.3.0.23028 (inc) |
| foxit | pdf_editor | From 2024.1.0.23997 (inc) to 2024.4.1.27687 (inc) |
| foxit | pdf_editor | 2025.1.0.27937 |
| foxit | pdf_reader | to 2025.1.0.27937 (exc) |
| microsoft | windows | * |
| foxit | pdf_editor | to 13.1.7.63027 (inc) |
| foxit | pdf_editor | From 2023.1.0.55583 (inc) to 2023.3.0.63083 (inc) |
| foxit | pdf_editor | From 2024.1.0.63682 (inc) to 2024.4.1.66479 (inc) |
| foxit | pdf_editor | 2025.1.0.66692 |
| foxit | pdf_reader | to 2025.1.0.66692 (inc) |
| apple | macos | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-125 | The product reads data past the end, or before the beginning, of the intended buffer. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a flaw in Foxit PDF Reader's handling of PRC files, where improper validation of user-supplied data can cause an out-of-bounds read. This can be exploited by remote attackers to execute arbitrary code on the affected system if the user opens a malicious file or visits a malicious page.
How can this vulnerability impact me? :
If exploited, this vulnerability allows attackers to execute arbitrary code with the privileges of the Foxit PDF Reader process, potentially leading to system compromise, data theft, or further malware installation. Exploitation requires user interaction, such as opening a malicious file or visiting a malicious webpage.