Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-59803: n/a

0
Medium
VulnerabilityCVE-2025-59803cvecve-2025-59803
Published: Thu Dec 11 2025 (12/11/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

Foxit PDF Editor and Reader before 2025.2.1 allow signature spoofing via triggers. An attacker can embed triggers (e.g., JavaScript) in a PDF document that execute during the signing process. When a signer reviews the document, the content appears normal. However, once the signature is applied, the triggers modify content on other pages or optional content layers without explicit warning. This can cause the signed PDF to differ from what the signer saw, undermining the trustworthiness of the digital signature. The fixed versions are 2025.2.1, 14.0.1, and 13.2.1.

AI-Powered Analysis

AILast updated: 12/11/2025, 15:54:50 UTC

Technical Analysis

CVE-2025-59803 is a signature spoofing vulnerability affecting Foxit PDF Editor and Reader versions before 2025.2.1. The flaw arises because the software allows embedded triggers, such as JavaScript, within PDF documents to execute during the signing process. When a signer reviews the document, the visible content appears legitimate and unchanged. However, once the digital signature is applied, these embedded triggers activate and modify content on other pages or optional content layers without any explicit warning or indication to the signer. This behavior effectively means the signed PDF can differ from what the signer reviewed and approved, breaking the fundamental trust model of digital signatures. The vulnerability exploits the dynamic content capabilities of PDFs and the insufficient validation or locking of document state at signing time. The issue was reserved in September 2025 and published in December 2025, with no known exploits reported in the wild yet. The vendor has addressed the vulnerability in versions 2025.2.1, 14.0.1, and 13.2.1. This vulnerability poses a significant risk to document integrity and non-repudiation, especially in environments where PDFs are used for contracts, legal documents, or compliance records. Attackers could leverage this to perpetrate fraud, alter agreements post-signature, or undermine legal evidence.

Potential Impact

For European organizations, the impact of CVE-2025-59803 is substantial, particularly in sectors relying heavily on digitally signed PDF documents such as legal, financial, government, and healthcare. The vulnerability undermines the integrity and non-repudiation guarantees of digital signatures, potentially allowing attackers to alter signed documents after approval without detection. This can lead to fraudulent contracts, unauthorized changes to official records, and legal disputes. The trustworthiness of electronic document workflows is compromised, which may also affect compliance with EU regulations like eIDAS that govern electronic signatures and trust services. Organizations may face reputational damage, financial losses, and regulatory penalties if exploited. The absence of known exploits currently provides a window for proactive mitigation, but the ease of embedding JavaScript in PDFs and the widespread use of Foxit products increase the risk of future exploitation. The vulnerability affects confidentiality less directly but severely impacts integrity and availability of trustworthy document workflows.

Mitigation Recommendations

European organizations should immediately upgrade Foxit PDF Editor and Reader to versions 2025.2.1, 14.0.1, or 13.2.1 to remediate this vulnerability. Beyond patching, organizations should implement strict PDF document handling policies that include scanning incoming and outgoing PDFs for embedded scripts or suspicious triggers using specialized PDF security tools. Training users to recognize suspicious PDF behaviors and enforcing signing workflows that include manual or automated verification of document integrity post-signature can reduce risk. Consider restricting the use of JavaScript in PDFs or disabling script execution in PDF readers where feasible. Organizations should also audit existing signed documents for signs of post-signature modifications and maintain detailed logs of signing events. For high-risk environments, adopting alternative secure signing solutions that cryptographically lock the entire document state at signing time can provide stronger guarantees. Regularly monitoring threat intelligence feeds for emerging exploits related to this vulnerability is advised.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-09-22T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 693ae5917d4c6f31f7b66ff1

Added to database: 12/11/2025, 3:38:57 PM

Last enriched: 12/11/2025, 3:54:50 PM

Last updated: 12/12/2025, 4:01:41 AM

Views: 8

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats