CVE-2026-3776
Received Received - Intake
Null Pointer Dereference in PDF Stamp Annotation Causes DoS

Publication date: 2026-04-01

Last updated on: 2026-04-14

Assigner: Foxit

Description
The application does not validate the presence of required appearance (AP) data before accessing stamp annotation resources. When a PDF contains a stamp annotation missing its AP entry, the code continues to dereference the associated object without a prior null or validity check, which allows a crafted document to trigger a null pointer dereference and crash the application, resulting in denial of service.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-01
Last Modified
2026-04-14
Generated
2026-05-07
AI Q&A
2026-04-01
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 12 associated CPEs
Vendor Product Version / Range
foxit pdf_editor From 2023.1.0.15510 (inc) to 2023.3.0.23028 (inc)
foxit pdf_editor From 2024.1.0.23997 (inc) to 2024.4.1.27687 (inc)
foxit pdf_editor to 13.2.2.24014 (inc)
foxit pdf_editor From 14.0.0.33046 (inc) to 14.0.2.33402 (inc)
foxit pdf_editor From 2025.1.0.27937 (inc) to 2025.3.0.35737 (inc)
foxit pdf_reader to 2025.3.0.35737 (inc)
foxit pdf_editor From 2023.1.0.55583 (inc) to 2023.3.0.63083 (inc)
foxit pdf_editor From 2024.1.0.63682 (inc) to 2024.4.1.66479 (inc)
foxit pdf_editor to 13.2.2.63349 (inc)
foxit pdf_editor From 14.0.0.68868 (inc) to 14.0.2.69164 (inc)
foxit pdf_editor From 2025.1.0.66692 (inc) to 2025.3.0.69570 (inc)
foxit pdf_reader to 2025.3.0.69570 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-476 The product dereferences a pointer that it expects to be valid but is NULL.
Attack-Flow Graph
AI Powered Q&A
How can this vulnerability impact me? :

This vulnerability can impact you by causing the application that processes PDFs to crash unexpectedly.

Since the flaw leads to a denial of service, it can disrupt normal operations, potentially causing downtime or loss of availability of the affected software.

However, this vulnerability does not affect confidentiality or integrity, as it only results in an application crash.


Can you explain this vulnerability to me?

This vulnerability occurs because the application does not check if required appearance (AP) data is present before accessing stamp annotation resources in a PDF.

If a PDF contains a stamp annotation that is missing its AP entry, the application attempts to access the associated object without verifying if it is null or valid.

This leads to a null pointer dereference, which causes the application to crash.

In summary, a specially crafted PDF can trigger this flaw and cause a denial of service by crashing the application.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The vulnerability described results in a denial of service due to a null pointer dereference when processing crafted PDF documents. It does not involve unauthorized access, data leakage, or modification of sensitive information.

Therefore, based on the provided information, this vulnerability does not directly impact compliance with common standards and regulations such as GDPR or HIPAA, which primarily focus on data protection, privacy, and integrity.


What immediate steps should I take to mitigate this vulnerability?

To mitigate this vulnerability, users should update their Foxit PDF Reader and Editor applications to the latest versions.

Updates can be obtained through the application's built-in update feature or by downloading the latest versions from the Foxit website.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart