CVE-2011-10030

HIGH

Foxit PDF Reader < 4.3.1.0218 - Code Injection

Title source: llm

Description

Foxit PDF Reader <  4.3.1.0218 exposes a JavaScript API function, createDataObject(), that allows untrusted PDF content to write arbitrary files anywhere on disk. By embedding a malicious PDF that calls this API, an attacker can drop executables or scripts into privileged folders, leading to code execution the next time the system boots or the user logs in.

Exploits (2)

exploitdb WORKING POC VERIFIED
by Metasploit · rubylocalwindows
https://www.exploit-db.com/exploits/16978
metasploit WORKING POC NORMAL
by bannedit, Chris Evans · rubypocwin
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/windows/fileformat/foxit_reader_filewrite.rb

Scores

CVSS v4 8.4
EPSS 0.0303
EPSS Percentile 86.7%
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

CISA SSVC

Vulnrichment
Exploitation poc
Automatable no
Technical Impact total

Details

CWE
CWE-73
Status published
Products (1)
Foxit Software/Foxit PDF Reader < 4.3.1.0218
Published Aug 20, 2025
Tracked Since Feb 18, 2026