CVE-2025-9328
BaseFortify
Publication date: 2025-09-02
Last updated on: 2025-09-08
Assigner: Zero Day Initiative
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| foxit | pdf_editor | to 13.1.7.23637 (inc) |
| foxit | pdf_editor | From 2023.1.0.15510 (inc) to 2023.3.0.23028 (inc) |
| foxit | pdf_editor | From 2024.1.0.23997 (inc) to 2024.4.1.27687 (inc) |
| foxit | pdf_editor | 2025.1.0.27937 |
| foxit | pdf_reader | to 2025.1.0.27937 (exc) |
| microsoft | windows | * |
| foxit | pdf_editor | to 13.1.7.63027 (inc) |
| foxit | pdf_editor | From 2023.1.0.55583 (inc) to 2023.3.0.63083 (inc) |
| foxit | pdf_editor | From 2024.1.0.63682 (inc) to 2024.4.1.66479 (inc) |
| foxit | pdf_editor | 2025.1.0.66692 |
| foxit | pdf_reader | to 2025.1.0.66692 (inc) |
| apple | macos | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-125 | The product reads data past the end, or before the beginning, of the intended buffer. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a flaw in Foxit PDF Reader's handling of PRC files, where improper validation of user-supplied data can cause an out-of-bounds read. This can be exploited by remote attackers to execute arbitrary code on the affected system if the user opens a malicious file or visits a malicious page.
How can this vulnerability impact me? :
If exploited, this vulnerability allows attackers to execute arbitrary code on your system with the privileges of the Foxit PDF Reader process. This can lead to unauthorized actions such as data theft, system compromise, or further malware installation.