CVE-2025-9330
BaseFortify
Publication date: 2025-09-02
Last updated on: 2025-09-08
Assigner: Zero Day Initiative
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| foxit | pdf_editor | to 13.1.7.23637 (inc) |
| foxit | pdf_editor | From 2023.1.0.15510 (inc) to 2023.3.0.23028 (inc) |
| foxit | pdf_editor | From 2024.1.0.23997 (inc) to 2024.4.1.27687 (inc) |
| foxit | pdf_editor | 2025.1.0.27937 |
| foxit | pdf_reader | to 2025.1.0.27937 (inc) |
| microsoft | windows | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-427 | The product uses a fixed or controlled search path to find resources, but one or more locations in that path can be under the control of unintended actors. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in the Foxit PDF Reader Update Service, where it loads a library from an unsecured location. A local attacker who already has the ability to execute low-privileged code on the system can exploit this flaw to escalate their privileges and execute code with SYSTEM-level permissions.
How can this vulnerability impact me? :
If exploited, this vulnerability allows an attacker to gain elevated privileges on the affected system, potentially leading to full control over the system, unauthorized access to sensitive data, and the ability to execute malicious code with high-level permissions.