CVE-2026-3776
Null Pointer Dereference in PDF Stamp Annotation Causes DoS
Publication date: 2026-04-01
Last updated on: 2026-04-14
Assigner: Foxit
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| foxit | pdf_editor | From 2023.1.0.15510 (inc) to 2023.3.0.23028 (inc) |
| foxit | pdf_editor | From 2024.1.0.23997 (inc) to 2024.4.1.27687 (inc) |
| foxit | pdf_editor | to 13.2.2.24014 (inc) |
| foxit | pdf_editor | From 14.0.0.33046 (inc) to 14.0.2.33402 (inc) |
| foxit | pdf_editor | From 2025.1.0.27937 (inc) to 2025.3.0.35737 (inc) |
| foxit | pdf_reader | to 2025.3.0.35737 (inc) |
| foxit | pdf_editor | From 2023.1.0.55583 (inc) to 2023.3.0.63083 (inc) |
| foxit | pdf_editor | From 2024.1.0.63682 (inc) to 2024.4.1.66479 (inc) |
| foxit | pdf_editor | to 13.2.2.63349 (inc) |
| foxit | pdf_editor | From 14.0.0.68868 (inc) to 14.0.2.69164 (inc) |
| foxit | pdf_editor | From 2025.1.0.66692 (inc) to 2025.3.0.69570 (inc) |
| foxit | pdf_reader | to 2025.3.0.69570 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-476 | The product dereferences a pointer that it expects to be valid but is NULL. |
Attack-Flow Graph
AI Powered Q&A
How can this vulnerability impact me? :
This vulnerability can impact you by causing the application that processes PDFs to crash unexpectedly.
Since the flaw leads to a denial of service, it can disrupt normal operations, potentially causing downtime or loss of availability of the affected software.
However, this vulnerability does not affect confidentiality or integrity, as it only results in an application crash.
Can you explain this vulnerability to me?
This vulnerability occurs because the application does not check if required appearance (AP) data is present before accessing stamp annotation resources in a PDF.
If a PDF contains a stamp annotation that is missing its AP entry, the application attempts to access the associated object without verifying if it is null or valid.
This leads to a null pointer dereference, which causes the application to crash.
In summary, a specially crafted PDF can trigger this flaw and cause a denial of service by crashing the application.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
The vulnerability described results in a denial of service due to a null pointer dereference when processing crafted PDF documents. It does not involve unauthorized access, data leakage, or modification of sensitive information.
Therefore, based on the provided information, this vulnerability does not directly impact compliance with common standards and regulations such as GDPR or HIPAA, which primarily focus on data protection, privacy, and integrity.
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, users should update their Foxit PDF Reader and Editor applications to the latest versions.
Updates can be obtained through the application's built-in update feature or by downloading the latest versions from the Foxit website.