CVE-2025-55314
BaseFortify
Publication date: 2025-12-11
Last updated on: 2025-12-18
Assigner: MITRE
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| foxit | pdf_editor | to 13.1.7.23637 (inc) |
| foxit | pdf_editor | From 2023.1.0.15510 (inc) to 2023.3.0.23028 (inc) |
| foxit | pdf_editor | From 2024.1.0.23997 (inc) to 2024.4.1.27687 (inc) |
| foxit | pdf_editor | 2025.1.0.27937 |
| foxit | pdf_reader | to 2025.1.0.27937 (inc) |
| microsoft | windows | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-476 | The product dereferences a pointer that it expects to be valid but is NULL. |
Attack-Flow Graph
AI Powered Q&A
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, users should update their Foxit PDF Reader and Editor applications to the latest versions. Updates can be obtained through the application's built-in update feature or by downloading the latest versions from the Foxit website. [1]
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, users should update their Foxit PDF Reader and Editor applications to the latest versions. Updates can be obtained through the application's built-in update feature or by downloading the latest versions from the Foxit website. [1]
Can you explain this vulnerability to me?
This vulnerability occurs in Foxit PDF and Editor for Windows and macOS before versions 13.2 and 2025 before 2025.2. When pages in a PDF are deleted using JavaScript, the application may not properly update its internal states. Later operations that manage annotations assume these states are still valid, which can cause the application to dereference invalid or released memory. This can result in memory corruption, application crashes, and potentially allow an attacker to execute arbitrary code.
How can this vulnerability impact me? :
This vulnerability can lead to memory corruption and application crashes, which may disrupt normal use of the Foxit PDF and Editor software. More seriously, it could allow an attacker to execute arbitrary code on your system, potentially compromising your device's security and data.