CVE-2025-66499
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-12-19

Last updated on: 2025-12-23

Assigner: Foxit

Description
A heap-based buffer overflow vulnerability exists in the PDF parsing of Foxit PDF Reader when processing specially crafted JBIG2 data. An integer overflow in the calculation of the image buffer size may occur, potentially allowing a remote attacker to execute arbitrary code.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-12-19
Last Modified
2025-12-23
Generated
2026-05-07
AI Q&A
2025-12-19
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 14 associated CPEs
Vendor Product Version / Range
foxit pdf_editor to 13.2.1.23955 (inc)
foxit pdf_editor From 14.0.0.33046 (inc) to 14.0.1.33197 (inc)
foxit pdf_editor From 2023.1.0.15510 (inc) to 2023.3.0.23028 (inc)
foxit pdf_editor From 2024.1.0.23997 (inc) to 2024.4.1.27687 (inc)
foxit pdf_editor From 2025.1.0.27937 (inc) to 2025.2.1.33197 (inc)
foxit pdf_reader to 2025.2.1.33197 (inc)
microsoft windows *
foxit pdf_editor to 13.2.1.63315 (inc)
foxit pdf_editor From 14.0.0.33046 (inc) to 14.0.1.69005 (inc)
foxit pdf_editor From 2023.1.0.15510 (inc) to 2023.3.0.63083 (inc)
foxit pdf_editor From 2024.1.0.23997 (inc) to 2024.4.1.66479 (inc)
foxit pdf_editor From 2025.1.0.27937 (inc) to 2025.2.1.69005 (inc)
foxit pdf_reader to 2025.2.1.69005 (inc)
apple macos *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-190 The product performs a calculation that can produce an integer overflow or wraparound when the logic assumes that the resulting value will always be larger than the original value. This occurs when an integer value is incremented to a value that is too large to store in the associated representation. When this occurs, the value may become a very small or negative number.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is a heap-based buffer overflow in Foxit PDF Reader's PDF parsing component when it processes specially crafted JBIG2 data. It involves an integer overflow during the calculation of the image buffer size, which can potentially allow a remote attacker to execute arbitrary code on the affected system.


How can this vulnerability impact me? :

The vulnerability can lead to remote code execution, meaning an attacker could run malicious code on your system without your permission. This could compromise the confidentiality, integrity, and availability of your data and system.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart