Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-66495: CWE-416 Use After Free in Foxit Software Inc. Foxit PDF Reader

0
High
VulnerabilityCVE-2025-66495cvecve-2025-66495cwe-416
Published: Fri Dec 19 2025 (12/19/2025, 07:09:09 UTC)
Source: CVE Database V5
Vendor/Project: Foxit Software Inc.
Product: Foxit PDF Reader

Description

A use-after-free vulnerability exists in the annotation handling of Foxit PDF Reader before 2025.2.1, 14.0.1, and 13.2.1 on Windows and MacOS. When opening a PDF containing specially crafted JavaScript, a pointer to memory that has already been freed may be accessed or dereferenced, potentially allowing a remote attacker to execute arbitrary code.

AI-Powered Analysis

AILast updated: 12/26/2025, 08:06:38 UTC

Technical Analysis

CVE-2025-66495 is a use-after-free vulnerability classified under CWE-416 found in Foxit PDF Reader's annotation handling module. This vulnerability affects multiple versions of Foxit PDF Reader on Windows and MacOS platforms, specifically versions 2025.2.1 and earlier, 14.0.1 and earlier, and 13.2.1 and earlier. The flaw arises when the application processes a PDF file containing maliciously crafted JavaScript code embedded within annotations. The vulnerability occurs because the software accesses or dereferences a pointer to memory that has already been freed, leading to undefined behavior. This memory corruption can be exploited by a remote attacker to execute arbitrary code on the victim's machine. The attack vector requires the victim to open a malicious PDF file, thus necessitating user interaction but no prior authentication or elevated privileges. The CVSS v3.1 base score is 7.8, indicating high severity, with metrics showing low attack complexity, no privileges required, but user interaction needed. The impact on confidentiality, integrity, and availability is high, as arbitrary code execution could allow full system compromise. No public exploits or patches are currently available, but the vulnerability is publicly disclosed and should be addressed promptly. The flaw highlights the risks associated with processing complex PDF features like JavaScript and annotations, which are often overlooked in security assessments.

Potential Impact

For European organizations, this vulnerability poses a significant risk due to the widespread use of Foxit PDF Reader in corporate, governmental, and critical infrastructure environments. Successful exploitation could lead to remote code execution, enabling attackers to steal sensitive data, disrupt operations, or establish persistent footholds within networks. Sectors such as finance, healthcare, legal, and public administration, which frequently handle PDF documents, are particularly vulnerable. The requirement for user interaction means phishing or social engineering campaigns could be leveraged to deliver malicious PDFs. Given the high confidentiality, integrity, and availability impact, exploitation could result in data breaches, ransomware deployment, or espionage activities. The lack of known exploits currently provides a window for proactive mitigation, but the public disclosure increases the risk of future weaponization. European organizations with lax PDF handling policies or outdated Foxit Reader installations face elevated exposure. The threat also underscores the importance of endpoint security controls and user awareness training in mitigating such risks.

Mitigation Recommendations

1. Immediately inventory and identify all instances of Foxit PDF Reader in use across the organization, including version numbers and operating systems. 2. Monitor Foxit Software's official channels for patches or updates addressing CVE-2025-66495 and apply them as soon as they become available. 3. Until patches are released, consider temporarily restricting or disabling the use of Foxit PDF Reader for opening untrusted or external PDF files. 4. Implement strict email filtering and attachment scanning to detect and block potentially malicious PDFs containing JavaScript. 5. Employ endpoint protection solutions capable of detecting anomalous behavior related to memory corruption or code execution attempts originating from PDF readers. 6. Educate users about the risks of opening unsolicited or suspicious PDF attachments, emphasizing the need for caution with documents from unknown sources. 7. Where feasible, use sandboxing or isolated environments for opening PDFs from untrusted origins to contain potential exploitation. 8. Review and harden PDF reader configurations to disable or limit JavaScript execution within PDFs if the feature is not essential for business processes. 9. Maintain robust backup and incident response plans to quickly recover from potential compromises stemming from exploitation of this vulnerability.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Foxit
Date Reserved
2025-12-03T01:33:55.297Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6944fb8919341fe1888ac95a

Added to database: 12/19/2025, 7:15:21 AM

Last enriched: 12/26/2025, 8:06:38 AM

Last updated: 2/7/2026, 9:02:58 AM

Views: 80

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats