Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13941: CWE-732: Incorrect Permission Assignment for Critical Resource in Foxit Software Inc. Foxit PDF Reader

0
High
VulnerabilityCVE-2025-13941cvecve-2025-13941cwe-732
Published: Fri Dec 19 2025 (12/19/2025, 01:51:22 UTC)
Source: CVE Database V5
Vendor/Project: Foxit Software Inc.
Product: Foxit PDF Reader

Description

A local privilege escalation vulnerability exists in the Foxit PDF Reader/Editor Update Service. During plugin installation, incorrect file system permissions are assigned to resources used by the update service. A local attacker with low privileges could modify or replace these resources, which are later executed by the service, resulting in execution of arbitrary code with SYSTEM privileges.

AI-Powered Analysis

AILast updated: 12/26/2025, 04:29:49 UTC

Technical Analysis

CVE-2025-13941 is a local privilege escalation vulnerability classified under CWE-732 (Incorrect Permission Assignment for Critical Resource) found in Foxit Software Inc.'s Foxit PDF Reader and Editor Update Service. The vulnerability stems from improper file system permissions assigned to resources used by the update service during plugin installation. Specifically, these resources—likely executable files or scripts—are accessible and modifiable by low-privileged local users. Because the update service later executes these resources with SYSTEM-level privileges, an attacker with local access can replace or modify them to execute arbitrary code with the highest system privileges. This can lead to full system compromise, including unauthorized access to sensitive data, system integrity violations, and potential denial of service. The vulnerability affects multiple versions of Foxit PDF Reader, including versions 2025.2.1 and earlier, 14.0.1 and earlier, and 13.2.1 and earlier. The CVSS v3.1 score is 8.8, indicating high severity, with an attack vector of local access, low complexity, requiring low privileges, no user interaction, and a scope change due to SYSTEM-level code execution. Although no known exploits have been reported in the wild, the vulnerability presents a significant risk due to the widespread use of Foxit PDF Reader in enterprise environments. The lack of patches at the time of publication necessitates immediate attention to mitigate risk.

Potential Impact

For European organizations, this vulnerability poses a serious threat to endpoint security, particularly for those relying on Foxit PDF Reader for document handling. Successful exploitation allows attackers to escalate privileges from a low-privileged user to SYSTEM level, potentially leading to full system compromise. This can result in unauthorized access to confidential information, disruption of business operations, and the ability to deploy further malware or ransomware. Organizations in sectors such as finance, government, healthcare, and critical infrastructure are especially at risk due to the sensitivity of their data and the potential impact of system compromise. The vulnerability's local attack vector means that insider threats or attackers who have gained initial footholds through other means could leverage this flaw to deepen their control over affected systems. The high severity and scope change amplify the risk, making timely mitigation critical to prevent lateral movement and privilege escalation within corporate networks.

Mitigation Recommendations

1. Apply official patches from Foxit Software immediately once they become available to correct the file permission assignments in the update service. 2. Until patches are released, manually audit and restrict file system permissions on the update service's plugin installation directories and executable resources to prevent modification by non-administrative users. 3. Implement strict endpoint security controls, including application whitelisting and integrity monitoring, to detect unauthorized changes to update service files. 4. Limit local user privileges wherever possible to reduce the risk of exploitation by low-privileged users. 5. Monitor system logs and security alerts for suspicious activities related to the Foxit update service or unexpected privilege escalations. 6. Educate IT and security teams about this vulnerability to ensure rapid response and remediation. 7. Consider deploying host-based intrusion prevention systems (HIPS) that can block unauthorized code execution attempts at the SYSTEM level. 8. Review and harden overall endpoint security posture, including restricting software installation rights and enforcing least privilege principles.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Foxit
Date Reserved
2025-12-03T01:32:27.232Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6944b7d24eb3efac36c40a38

Added to database: 12/19/2025, 2:26:26 AM

Last enriched: 12/26/2025, 4:29:49 AM

Last updated: 2/7/2026, 9:35:23 PM

Views: 58

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats