CVE-2025-59802: n/a
Foxit PDF Editor and Reader before 2025.2.1 allow signature spoofing via OCG. When Optional Content Groups (OCG) are supported, the state property of an OCG is runtime-only and not included in the digital signature computation buffer. An attacker can leverage JavaScript or PDF triggers to dynamically change the visibility of OCG content after signing (Post-Sign), allowing the visual content of a signed PDF to be modified without invalidating the signature. This may result in a mismatch between the signed content and what the signer or verifier sees, undermining the trustworthiness of the digital signature. The fixed versions are 2025.2.1, 14.0.1, and 13.2.1.
AI Analysis
Technical Summary
CVE-2025-59802 is a vulnerability in Foxit PDF Editor and Reader that allows attackers to spoof digital signatures by exploiting the handling of Optional Content Groups (OCG) within PDF documents. OCGs are layers or groups of content that can be selectively shown or hidden in a PDF. The vulnerability arises because the 'state' property of an OCG, which controls its visibility, is runtime-only and is not included in the digital signature's computation buffer. This means that after a PDF is signed, an attacker can use embedded JavaScript or PDF triggers to dynamically change which OCG content is visible without causing the digital signature to become invalid. Consequently, the visual representation of the signed document can be altered post-signing, leading to a mismatch between the signed content and what the signer or verifier actually sees. This undermines the fundamental trust model of digital signatures, which rely on the immutability of signed content. The flaw affects all Foxit PDF Editor and Reader versions before 2025.2.1, with fixes released in versions 2025.2.1, 14.0.1, and 13.2.1. Although no known exploits have been reported in the wild, the vulnerability poses a significant risk to document integrity and authenticity, particularly in environments where signed PDFs are used for contracts, legal documents, or compliance records. The attack vector requires the attacker to craft malicious PDFs that leverage JavaScript or PDF triggers to manipulate OCG visibility post-signing. This vulnerability does not require user interaction beyond opening the malicious PDF, and no authentication is needed to exploit it.
Potential Impact
For European organizations, this vulnerability threatens the integrity and authenticity of digitally signed PDF documents, which are widely used in legal, financial, governmental, and regulatory contexts. The ability to alter the visible content of a signed PDF without invalidating the signature can lead to fraud, misinformation, and legal disputes. Organizations relying on Foxit PDF products for document signing and verification may unknowingly accept altered documents, undermining trust and compliance with regulations such as eIDAS, GDPR, and other digital signature frameworks. This can result in financial losses, reputational damage, and potential regulatory penalties. The vulnerability also complicates forensic investigations and audit trails, as the signed content no longer reliably represents what was originally approved. Given the widespread use of PDFs in Europe and the critical role of digital signatures in business and government processes, the impact is significant, especially for sectors like banking, legal services, public administration, and healthcare.
Mitigation Recommendations
Organizations should immediately upgrade Foxit PDF Editor and Reader to versions 2025.2.1, 14.0.1, or 13.2.1 or later to remediate this vulnerability. Until patches are applied, users should avoid opening PDFs from untrusted sources or those received unexpectedly, especially if they contain JavaScript or dynamic content. Implement strict PDF handling policies that disable JavaScript execution within PDF readers where possible. Use alternative PDF viewers that do not exhibit this vulnerability for verifying signed documents. Enhance document verification processes by cross-checking signed content using cryptographic hash comparisons or out-of-band verification methods rather than relying solely on visual inspection. Train staff to recognize suspicious PDF behavior and to report anomalies in signed documents. For high-risk documents, consider using additional digital signature validation tools that verify the integrity of all PDF content layers, including OCG states. Maintain an inventory of Foxit product deployments to ensure timely patch management. Finally, monitor threat intelligence sources for any emerging exploits related to this vulnerability.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Belgium, Sweden, Poland, Austria
CVE-2025-59802: n/a
Description
Foxit PDF Editor and Reader before 2025.2.1 allow signature spoofing via OCG. When Optional Content Groups (OCG) are supported, the state property of an OCG is runtime-only and not included in the digital signature computation buffer. An attacker can leverage JavaScript or PDF triggers to dynamically change the visibility of OCG content after signing (Post-Sign), allowing the visual content of a signed PDF to be modified without invalidating the signature. This may result in a mismatch between the signed content and what the signer or verifier sees, undermining the trustworthiness of the digital signature. The fixed versions are 2025.2.1, 14.0.1, and 13.2.1.
AI-Powered Analysis
Technical Analysis
CVE-2025-59802 is a vulnerability in Foxit PDF Editor and Reader that allows attackers to spoof digital signatures by exploiting the handling of Optional Content Groups (OCG) within PDF documents. OCGs are layers or groups of content that can be selectively shown or hidden in a PDF. The vulnerability arises because the 'state' property of an OCG, which controls its visibility, is runtime-only and is not included in the digital signature's computation buffer. This means that after a PDF is signed, an attacker can use embedded JavaScript or PDF triggers to dynamically change which OCG content is visible without causing the digital signature to become invalid. Consequently, the visual representation of the signed document can be altered post-signing, leading to a mismatch between the signed content and what the signer or verifier actually sees. This undermines the fundamental trust model of digital signatures, which rely on the immutability of signed content. The flaw affects all Foxit PDF Editor and Reader versions before 2025.2.1, with fixes released in versions 2025.2.1, 14.0.1, and 13.2.1. Although no known exploits have been reported in the wild, the vulnerability poses a significant risk to document integrity and authenticity, particularly in environments where signed PDFs are used for contracts, legal documents, or compliance records. The attack vector requires the attacker to craft malicious PDFs that leverage JavaScript or PDF triggers to manipulate OCG visibility post-signing. This vulnerability does not require user interaction beyond opening the malicious PDF, and no authentication is needed to exploit it.
Potential Impact
For European organizations, this vulnerability threatens the integrity and authenticity of digitally signed PDF documents, which are widely used in legal, financial, governmental, and regulatory contexts. The ability to alter the visible content of a signed PDF without invalidating the signature can lead to fraud, misinformation, and legal disputes. Organizations relying on Foxit PDF products for document signing and verification may unknowingly accept altered documents, undermining trust and compliance with regulations such as eIDAS, GDPR, and other digital signature frameworks. This can result in financial losses, reputational damage, and potential regulatory penalties. The vulnerability also complicates forensic investigations and audit trails, as the signed content no longer reliably represents what was originally approved. Given the widespread use of PDFs in Europe and the critical role of digital signatures in business and government processes, the impact is significant, especially for sectors like banking, legal services, public administration, and healthcare.
Mitigation Recommendations
Organizations should immediately upgrade Foxit PDF Editor and Reader to versions 2025.2.1, 14.0.1, or 13.2.1 or later to remediate this vulnerability. Until patches are applied, users should avoid opening PDFs from untrusted sources or those received unexpectedly, especially if they contain JavaScript or dynamic content. Implement strict PDF handling policies that disable JavaScript execution within PDF readers where possible. Use alternative PDF viewers that do not exhibit this vulnerability for verifying signed documents. Enhance document verification processes by cross-checking signed content using cryptographic hash comparisons or out-of-band verification methods rather than relying solely on visual inspection. Train staff to recognize suspicious PDF behavior and to report anomalies in signed documents. For high-risk documents, consider using additional digital signature validation tools that verify the integrity of all PDF content layers, including OCG states. Maintain an inventory of Foxit product deployments to ensure timely patch management. Finally, monitor threat intelligence sources for any emerging exploits related to this vulnerability.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- mitre
- Date Reserved
- 2025-09-22T00:00:00.000Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 693ae5917d4c6f31f7b66fee
Added to database: 12/11/2025, 3:38:57 PM
Last enriched: 12/11/2025, 3:55:08 PM
Last updated: 2/5/2026, 9:45:11 PM
Views: 42
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-1964: Improper Access Controls in WeKan
MediumCVE-2026-25815: CWE-1394 Use of Default Cryptographic Key in Fortinet FortiOS
LowCVE-2026-1963: Improper Access Controls in WeKan
MediumCVE-2025-15551: CWE-95 Improper Neutralization of Directives in Dynamically Evaluated Code ('Eval Injection') in TP-Link Systems Inc. Archer MR200 v5.2
MediumCVE-2026-1962: Improper Access Controls in WeKan
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.