CVE-2025-59802
HIGHFoxit Pdf Editor < 13.2.0.63256 - Authentication Bypass by Spoofing
Title source: ruleDescription
Foxit PDF Editor and Reader before 2025.2.1 allow signature spoofing via OCG. When Optional Content Groups (OCG) are supported, the state property of an OCG is runtime-only and not included in the digital signature computation buffer. An attacker can leverage JavaScript or PDF triggers to dynamically change the visibility of OCG content after signing (Post-Sign), allowing the visual content of a signed PDF to be modified without invalidating the signature. This may result in a mismatch between the signed content and what the signer or verifier sees, undermining the trustworthiness of the digital signature. The fixed versions are 2025.2.1, 14.0.1, and 13.2.1.
Scores
CVSS v3
7.5
EPSS
0.0003
EPSS Percentile
8.3%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
Classification
CWE
CWE-290
Status
published
Affected Products (8)
foxit/pdf_editor
< 13.2.0.63256
foxit/pdf_editor
foxit/pdf_editor
foxit/pdf_editor
foxit/pdf_reader
< 2025.2.0.68868
foxit/pdf_editor
foxit/pdf_editor
foxit/pdf_editor
Timeline
Published
Dec 11, 2025
Tracked Since
Feb 18, 2026