Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-66493: CWE-416 Use After Free in Foxit Software Inc. Foxit PDF Editor

0
High
VulnerabilityCVE-2025-66493cvecve-2025-66493cwe-416
Published: Fri Dec 19 2025 (12/19/2025, 07:07:43 UTC)
Source: CVE Database V5
Vendor/Project: Foxit Software Inc.
Product: Foxit PDF Editor

Description

A use-after-free vulnerability exists in the AcroForm handling of Foxit PDF Reader and Foxit PDF Editor before 2025.2.1,14.0.1 and 13.2.1 on Windows . When opening a PDF containing specially crafted JavaScript, a pointer to memory that has already been freed may be accessed or dereferenced, potentially allowing a remote attacker to execute arbitrary code.

AI-Powered Analysis

AILast updated: 12/26/2025, 08:06:08 UTC

Technical Analysis

CVE-2025-66493 is a use-after-free vulnerability classified under CWE-416, found in the AcroForm handling component of Foxit PDF Reader and Foxit PDF Editor on Windows. The flaw occurs when the software processes specially crafted PDF files containing malicious JavaScript code. Specifically, the vulnerability arises because the application accesses or dereferences a pointer to memory that has already been freed, leading to undefined behavior. This memory corruption can be exploited by remote attackers to execute arbitrary code with the privileges of the user opening the PDF. The vulnerability affects multiple versions of Foxit PDF Editor and Reader, including all versions up to 2025.2.1, 14.0.1, and 13.2.1. The CVSS v3.1 score of 7.8 indicates a high severity, with the attack vector being local (the user must open the malicious file), low attack complexity, no privileges required, but user interaction is necessary. The impact includes potential full compromise of the affected system, with confidentiality, integrity, and availability all at high risk. No public exploits or active exploitation campaigns have been reported yet, but the presence of JavaScript in PDFs and widespread use of Foxit products make this a significant threat. The vulnerability was publicly disclosed on December 19, 2025, with no patch links currently available, suggesting that users should monitor vendor advisories closely. The vulnerability's nature means that attackers could craft PDFs that, when opened, trigger the use-after-free condition, leading to code execution, data theft, or system disruption.

Potential Impact

For European organizations, this vulnerability poses a significant risk due to the widespread use of Foxit PDF products in business, government, and critical infrastructure sectors. Successful exploitation could lead to remote code execution, allowing attackers to gain control over affected systems, steal sensitive data, disrupt operations, or deploy ransomware. Sectors heavily reliant on PDF workflows, such as legal, finance, healthcare, and public administration, are particularly vulnerable. The requirement for user interaction (opening a malicious PDF) means phishing campaigns or malicious document distribution could be effective attack vectors. Given the high confidentiality, integrity, and availability impact, exploitation could result in data breaches, operational downtime, and reputational damage. The lack of known exploits in the wild currently provides a window for proactive mitigation, but the high severity score demands urgent attention. European organizations with less mature patch management or endpoint security controls may face elevated risk. Additionally, the vulnerability could be leveraged in targeted attacks against high-value entities or critical infrastructure within Europe.

Mitigation Recommendations

1. Monitor Foxit Software advisories closely and apply security patches immediately once they become available for the affected versions. 2. Until patches are released, disable or restrict JavaScript execution within Foxit PDF Reader and Editor settings to reduce attack surface. 3. Implement strict email filtering and attachment scanning to detect and block suspicious PDF files containing JavaScript or other embedded code. 4. Educate users on the risks of opening unsolicited or unexpected PDF attachments, emphasizing caution with documents from unknown or untrusted sources. 5. Deploy endpoint detection and response (EDR) solutions capable of identifying anomalous behaviors associated with use-after-free exploitation attempts. 6. Use application whitelisting and sandboxing techniques to limit the impact of potential code execution from compromised PDF readers. 7. Regularly audit and inventory software versions across the organization to ensure vulnerable versions are identified and remediated promptly. 8. Consider network segmentation to isolate critical systems that process sensitive PDF documents, minimizing lateral movement opportunities for attackers.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Foxit
Date Reserved
2025-12-03T01:33:55.297Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6944fb8919341fe1888ac954

Added to database: 12/19/2025, 7:15:21 AM

Last enriched: 12/26/2025, 8:06:08 AM

Last updated: 2/6/2026, 7:49:59 PM

Views: 32

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats