Description
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PDF Editor 11.1.1.53537;. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within JavaScript optimizations. The issue results from an improper optimization, which can result in a type confusion condition. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-16733.
References (2)
Core 2
Core References
Vendor Advisory
https://www.foxit.com/support/security-bulletins.html
Third Party Advisory, VDB Entry
https://www.zerodayinitiative.com/advisories/ZDI-22-1049/
Scores
CVSS v3
7.8
EPSS
0.0201
EPSS Percentile
83.8%
Attack Vector
LOCAL
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
no
Technical Impact
total
Details
CWE
CWE-843
Status
published
Products (3)
foxit/pdf_editor
12.0.0.12394
foxit/pdf_editor
< 10.1.9
foxit/pdf_reader
< 12.0.1
Published
Mar 29, 2023
Tracked Since
Feb 18, 2026