CVE-2023-35985: CWE-73: External Control of File Name or Path in Foxit Foxit Reader
An arbitrary file creation vulnerability exists in the Javascript exportDataObject API of Foxit Reader 12.1.3.15356 due to a failure to properly validate a dangerous extension. A specially crafted malicious file can create files at arbitrary locations, which can lead to arbitrary code execution. An attacker needs to trick the user into opening the malicious file to trigger this vulnerability. Exploitation is also possible if a user visits a specially-crafted malicious site if the browser plugin extension is enabled.
AI Analysis
Technical Summary
CVE-2023-35985 is a vulnerability classified under CWE-73 (External Control of File Name or Path) affecting Foxit Reader version 12.1.3.15356. The issue arises from the Javascript exportDataObject API failing to properly validate file extensions, allowing an attacker to craft malicious files that can create arbitrary files anywhere on the victim’s system. This arbitrary file creation can be leveraged to execute malicious code, compromising system integrity and confidentiality. The attack vector requires user interaction: either opening a malicious PDF file or visiting a malicious website if the Foxit Reader browser plugin is enabled. The vulnerability is remotely exploitable over the network without privileges but requires user interaction, as indicated by the CVSS vector (AV:N/AC:L/PR:N/UI:R). The impact is severe, affecting confidentiality, integrity, and availability, with a CVSS score of 8.8. No patches were linked in the provided data, and no known exploits are reported in the wild, but the risk remains significant due to the potential for arbitrary code execution. The vulnerability highlights the risks of insufficient input validation in document processing software and the dangers of browser plugins that extend PDF reader functionality.
Potential Impact
European organizations using Foxit Reader 12.1.3.15356 face significant risks from this vulnerability. Successful exploitation can lead to arbitrary code execution, enabling attackers to install malware, steal sensitive data, or disrupt operations. This is particularly critical for sectors handling sensitive or regulated data such as finance, healthcare, and government institutions. The requirement for user interaction means phishing or social engineering campaigns could be effective attack vectors. The presence of a browser plugin increases the attack surface, potentially allowing drive-by attacks via malicious websites. The impact extends to confidentiality breaches, data integrity loss, and system availability disruptions, which could result in regulatory penalties under GDPR if personal data is compromised. The lack of known exploits in the wild currently reduces immediate risk but does not eliminate the threat, especially as exploit code could be developed rapidly given the detailed vulnerability disclosure.
Mitigation Recommendations
Organizations should immediately verify if Foxit Reader version 12.1.3.15356 is in use and prioritize upgrading to a patched version once available. Until patches are released, disable the Foxit Reader browser plugin to reduce exposure to drive-by attacks. Implement strict email filtering and user awareness training to reduce the risk of opening malicious PDF files. Employ endpoint protection solutions capable of detecting suspicious file creation and execution behaviors. Restrict user permissions to prevent unauthorized file creation in sensitive directories. Monitor network traffic and logs for unusual activity related to Foxit Reader processes. Consider application whitelisting to prevent execution of unauthorized code. Coordinate with IT and security teams to ensure rapid incident response capability in case of exploitation attempts. Regularly review and update security policies related to document handling and browser plugin usage.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Belgium, Sweden, Poland, Austria
CVE-2023-35985: CWE-73: External Control of File Name or Path in Foxit Foxit Reader
Description
An arbitrary file creation vulnerability exists in the Javascript exportDataObject API of Foxit Reader 12.1.3.15356 due to a failure to properly validate a dangerous extension. A specially crafted malicious file can create files at arbitrary locations, which can lead to arbitrary code execution. An attacker needs to trick the user into opening the malicious file to trigger this vulnerability. Exploitation is also possible if a user visits a specially-crafted malicious site if the browser plugin extension is enabled.
AI-Powered Analysis
Technical Analysis
CVE-2023-35985 is a vulnerability classified under CWE-73 (External Control of File Name or Path) affecting Foxit Reader version 12.1.3.15356. The issue arises from the Javascript exportDataObject API failing to properly validate file extensions, allowing an attacker to craft malicious files that can create arbitrary files anywhere on the victim’s system. This arbitrary file creation can be leveraged to execute malicious code, compromising system integrity and confidentiality. The attack vector requires user interaction: either opening a malicious PDF file or visiting a malicious website if the Foxit Reader browser plugin is enabled. The vulnerability is remotely exploitable over the network without privileges but requires user interaction, as indicated by the CVSS vector (AV:N/AC:L/PR:N/UI:R). The impact is severe, affecting confidentiality, integrity, and availability, with a CVSS score of 8.8. No patches were linked in the provided data, and no known exploits are reported in the wild, but the risk remains significant due to the potential for arbitrary code execution. The vulnerability highlights the risks of insufficient input validation in document processing software and the dangers of browser plugins that extend PDF reader functionality.
Potential Impact
European organizations using Foxit Reader 12.1.3.15356 face significant risks from this vulnerability. Successful exploitation can lead to arbitrary code execution, enabling attackers to install malware, steal sensitive data, or disrupt operations. This is particularly critical for sectors handling sensitive or regulated data such as finance, healthcare, and government institutions. The requirement for user interaction means phishing or social engineering campaigns could be effective attack vectors. The presence of a browser plugin increases the attack surface, potentially allowing drive-by attacks via malicious websites. The impact extends to confidentiality breaches, data integrity loss, and system availability disruptions, which could result in regulatory penalties under GDPR if personal data is compromised. The lack of known exploits in the wild currently reduces immediate risk but does not eliminate the threat, especially as exploit code could be developed rapidly given the detailed vulnerability disclosure.
Mitigation Recommendations
Organizations should immediately verify if Foxit Reader version 12.1.3.15356 is in use and prioritize upgrading to a patched version once available. Until patches are released, disable the Foxit Reader browser plugin to reduce exposure to drive-by attacks. Implement strict email filtering and user awareness training to reduce the risk of opening malicious PDF files. Employ endpoint protection solutions capable of detecting suspicious file creation and execution behaviors. Restrict user permissions to prevent unauthorized file creation in sensitive directories. Monitor network traffic and logs for unusual activity related to Foxit Reader processes. Consider application whitelisting to prevent execution of unauthorized code. Coordinate with IT and security teams to ensure rapid incident response capability in case of exploitation attempts. Regularly review and update security policies related to document handling and browser plugin usage.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- talos
- Date Reserved
- 2023-08-15T20:00:03.273Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 690a53252a90255b94da66ef
Added to database: 11/4/2025, 7:25:25 PM
Last enriched: 11/4/2025, 7:39:30 PM
Last updated: 2/7/2026, 11:52:28 AM
Views: 52
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2084: OS Command Injection in D-Link DIR-823X
HighCVE-2026-2083: SQL Injection in code-projects Social Networking Site
MediumCVE-2026-2082: OS Command Injection in D-Link DIR-823X
MediumCVE-2026-2080: Command Injection in UTT HiPER 810
HighCVE-2026-2079: Improper Authorization in yeqifu warehouse
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.