CVE-2025-55313
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-12-11

Last updated on: 2025-12-18

Assigner: MITRE

Description
An issue was discovered in Foxit PDF and Editor for Windows and macOS before 13.2 and 2025 before 2025.2. They allow potential arbitrary code execution when processing crafted PDF files. The vulnerability stems from insufficient handling of memory allocation failures after assigning an extremely large value to a form field's charLimit property via JavaScript. This can result in memory corruption and may allow an attacker to execute arbitrary code by persuading a user to open a malicious file.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-12-11
Last Modified
2025-12-18
Generated
2026-05-07
AI Q&A
2025-12-11
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 11 associated CPEs
Vendor Product Version / Range
foxit pdf_editor From 2023.1.0.15510 (inc) to 2023.3.0.23028 (inc)
foxit pdf_editor From 2024.1.0.23997 (inc) to 2024.4.1.27687 (inc)
foxit pdf_editor 2025.1.0.27937
foxit pdf_reader to 2025.1.0.27937 (inc)
microsoft windows *
foxit pdf_editor to 13.1.7.63027 (inc)
foxit pdf_editor From 2023.1.0.55583 (inc) to 2023.3.0.63083 (inc)
foxit pdf_editor From 2024.1.0.63682 (inc) to 2024.4.1.66479 (inc)
foxit pdf_editor 2025.1.0.66692
foxit pdf_reader to 2025.1.0.66692 (inc)
apple macos *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-94 The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability exists in Foxit PDF and Editor for Windows and macOS before versions 13.2 and 2025 before 2025.2. It occurs due to insufficient handling of memory allocation failures when an extremely large value is assigned to a form field's charLimit property via JavaScript in a PDF file. This can cause memory corruption, potentially allowing an attacker to execute arbitrary code if a user opens a crafted malicious PDF file.


How can this vulnerability impact me? :

The vulnerability can lead to arbitrary code execution on the affected system, which means an attacker could run malicious code with the privileges of the user opening the malicious PDF. This could result in system compromise, data theft, or other malicious activities.


What immediate steps should I take to mitigate this vulnerability?

To mitigate this vulnerability, immediately update Foxit PDF and Editor for Windows and macOS to version 13.2 or later, or 2025 version 2025.2 or later. Avoid opening PDF files from untrusted or unknown sources to reduce the risk of exploitation.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart