CVE-2023-39542: CWE-73: External Control of File Name or Path in Foxit Foxit Reader
A code execution vulnerability exists in the Javascript saveAs API of Foxit Reader 12.1.3.15356. A specially crafted malformed file can create arbitrary files, which can lead to remote code execution. An attacker needs to trick the user into opening the malicious file to trigger this vulnerability. Exploitation is also possible if a user visits a specially crafted, malicious site if the browser plugin extension is enabled.
AI Analysis
Technical Summary
CVE-2023-39542 is a critical vulnerability classified under CWE-73 (External Control of File Name or Path) found in Foxit Reader version 12.1.3.15356. The flaw exists in the Javascript saveAs API, which is used to save files from within PDF documents. An attacker can craft a specially malformed PDF file that abuses this API to create arbitrary files on the victim’s system. This can lead to remote code execution if the attacker’s payload is executed after file creation. The attack vector requires user interaction: the victim must open the malicious PDF or visit a malicious website that triggers the vulnerability via the Foxit Reader browser plugin. The vulnerability does not require any privileges or prior authentication, making it accessible to remote attackers. The CVSS v3.1 score of 8.8 reflects the high impact on confidentiality, integrity, and availability, as arbitrary file creation can lead to system compromise. No patches or exploit code are currently publicly available, but the risk remains significant due to the ease of exploitation and potential damage. The vulnerability affects environments where Foxit Reader is used to open untrusted PDFs or where the browser plugin is enabled, increasing the attack surface. This vulnerability highlights the risks associated with embedded scripting in PDF readers and the need for strict controls on file system access from document viewers.
Potential Impact
For European organizations, the impact of CVE-2023-39542 can be severe. Successful exploitation can lead to arbitrary file creation and remote code execution, potentially allowing attackers to install malware, steal sensitive data, or disrupt operations. Sectors such as finance, government, healthcare, and critical infrastructure, which frequently handle PDF documents, are particularly vulnerable. The compromise of endpoints running Foxit Reader can serve as a foothold for lateral movement within networks, increasing the risk of widespread breaches. The vulnerability’s reliance on user interaction means phishing campaigns or malicious websites could be effective attack vectors. Additionally, organizations using the Foxit Reader browser plugin face increased risk from drive-by attacks. The confidentiality of sensitive documents and the integrity of systems are at risk, and availability could be impacted if ransomware or destructive payloads are deployed. The lack of known exploits in the wild currently limits immediate risk but does not diminish the urgency for mitigation given the high severity and ease of exploitation.
Mitigation Recommendations
1. Immediately disable the Foxit Reader browser plugin to reduce exposure to drive-by download attacks. 2. Avoid opening PDF files from untrusted or unknown sources until a patch is available. 3. Implement strict endpoint security controls to restrict the ability of applications to write files outside designated directories, using application whitelisting and file system permissions. 4. Monitor network traffic and endpoint behavior for suspicious file creation or execution activities related to Foxit Reader. 5. Educate users about the risks of opening unsolicited PDF attachments and visiting untrusted websites. 6. Once Foxit releases a security patch, prioritize its deployment across all affected systems. 7. Consider using alternative PDF readers with a better security track record or sandboxing PDF reader processes to limit potential damage. 8. Employ advanced threat detection tools capable of identifying exploitation attempts targeting this vulnerability.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Belgium, Sweden
CVE-2023-39542: CWE-73: External Control of File Name or Path in Foxit Foxit Reader
Description
A code execution vulnerability exists in the Javascript saveAs API of Foxit Reader 12.1.3.15356. A specially crafted malformed file can create arbitrary files, which can lead to remote code execution. An attacker needs to trick the user into opening the malicious file to trigger this vulnerability. Exploitation is also possible if a user visits a specially crafted, malicious site if the browser plugin extension is enabled.
AI-Powered Analysis
Technical Analysis
CVE-2023-39542 is a critical vulnerability classified under CWE-73 (External Control of File Name or Path) found in Foxit Reader version 12.1.3.15356. The flaw exists in the Javascript saveAs API, which is used to save files from within PDF documents. An attacker can craft a specially malformed PDF file that abuses this API to create arbitrary files on the victim’s system. This can lead to remote code execution if the attacker’s payload is executed after file creation. The attack vector requires user interaction: the victim must open the malicious PDF or visit a malicious website that triggers the vulnerability via the Foxit Reader browser plugin. The vulnerability does not require any privileges or prior authentication, making it accessible to remote attackers. The CVSS v3.1 score of 8.8 reflects the high impact on confidentiality, integrity, and availability, as arbitrary file creation can lead to system compromise. No patches or exploit code are currently publicly available, but the risk remains significant due to the ease of exploitation and potential damage. The vulnerability affects environments where Foxit Reader is used to open untrusted PDFs or where the browser plugin is enabled, increasing the attack surface. This vulnerability highlights the risks associated with embedded scripting in PDF readers and the need for strict controls on file system access from document viewers.
Potential Impact
For European organizations, the impact of CVE-2023-39542 can be severe. Successful exploitation can lead to arbitrary file creation and remote code execution, potentially allowing attackers to install malware, steal sensitive data, or disrupt operations. Sectors such as finance, government, healthcare, and critical infrastructure, which frequently handle PDF documents, are particularly vulnerable. The compromise of endpoints running Foxit Reader can serve as a foothold for lateral movement within networks, increasing the risk of widespread breaches. The vulnerability’s reliance on user interaction means phishing campaigns or malicious websites could be effective attack vectors. Additionally, organizations using the Foxit Reader browser plugin face increased risk from drive-by attacks. The confidentiality of sensitive documents and the integrity of systems are at risk, and availability could be impacted if ransomware or destructive payloads are deployed. The lack of known exploits in the wild currently limits immediate risk but does not diminish the urgency for mitigation given the high severity and ease of exploitation.
Mitigation Recommendations
1. Immediately disable the Foxit Reader browser plugin to reduce exposure to drive-by download attacks. 2. Avoid opening PDF files from untrusted or unknown sources until a patch is available. 3. Implement strict endpoint security controls to restrict the ability of applications to write files outside designated directories, using application whitelisting and file system permissions. 4. Monitor network traffic and endpoint behavior for suspicious file creation or execution activities related to Foxit Reader. 5. Educate users about the risks of opening unsolicited PDF attachments and visiting untrusted websites. 6. Once Foxit releases a security patch, prioritize its deployment across all affected systems. 7. Consider using alternative PDF readers with a better security track record or sandboxing PDF reader processes to limit potential damage. 8. Employ advanced threat detection tools capable of identifying exploitation attempts targeting this vulnerability.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- talos
- Date Reserved
- 2023-08-14T16:46:48.485Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 690a53272a90255b94da6747
Added to database: 11/4/2025, 7:25:27 PM
Last enriched: 11/4/2025, 7:34:59 PM
Last updated: 11/6/2025, 10:08:16 AM
Views: 4
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-11268: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in wpchill Strong Testimonials
MediumCVE-2025-12360: CWE-285 Improper Authorization in codesolz Better Find and Replace – AI-Powered Suggestions
MediumCVE-2025-10259: CWE-1284 Improper Validation of Specified Quantity in Input in Mitsubishi Electric Corporation MELSEC iQ-F Series FX5U-32MT/ES
MediumCVE-2025-12471: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in nerdpressteam Hubbub Lite – Fast, free social sharing and follow buttons
MediumCVE-2025-9338: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer in ASUS Armoury Crate
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.