Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-66501: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Foxit Software Inc. pdfonline.foxit.com

0
Medium
VulnerabilityCVE-2025-66501cvecve-2025-66501cwe-79
Published: Fri Dec 19 2025 (12/19/2025, 07:23:29 UTC)
Source: CVE Database V5
Vendor/Project: Foxit Software Inc.
Product: pdfonline.foxit.com

Description

A stored cross-site scripting (XSS) vulnerability exists in pdfonline.foxit.com within the Predefined Text feature of the Foxit eSign section. A crafted payload can be stored via the Identity “First Name” field, which is later rendered into the DOM without proper sanitization. As a result, the injected script may execute when predefined text is used or when viewing document properties.

AI-Powered Analysis

AILast updated: 12/19/2025, 07:32:03 UTC

Technical Analysis

CVE-2025-66501 is a stored cross-site scripting (XSS) vulnerability identified in Foxit Software Inc.'s pdfonline.foxit.com platform, specifically within the Predefined Text feature of the Foxit eSign section. The vulnerability stems from improper neutralization of user input in the 'First Name' field of the Identity section. When a malicious actor submits a crafted payload in this field, the input is stored and later rendered into the Document Object Model (DOM) without adequate sanitization or encoding. This flaw allows the injected JavaScript code to execute in the context of the victim's browser when predefined text is used or when viewing document properties. The vulnerability requires the attacker to have low privileges (PR:L) and some user interaction (UI:R), such as viewing the affected document or predefined text. The attack vector is network-based (AV:N), meaning it can be exploited remotely. The impact is primarily on confidentiality (C:H), as the attacker could steal sensitive information or session tokens, with limited impact on integrity (I:L) and no impact on availability (A:N). The vulnerability affects versions of pdfonline.foxit.com before December 1, 2025. No patches were listed at the time of publication, and no known exploits are currently reported in the wild. This vulnerability is classified under CWE-79, which covers improper neutralization of input during web page generation, a common cause of XSS attacks. Given the nature of the vulnerability, it could be leveraged for phishing, session hijacking, or data exfiltration attacks within affected environments.

Potential Impact

For European organizations, the exploitation of CVE-2025-66501 could lead to significant confidentiality breaches, including unauthorized access to sensitive document data, user credentials, or session tokens. Since the vulnerability resides in an online PDF and eSign service, attackers could target business workflows involving digital signatures and document management, potentially compromising legally sensitive documents or contracts. The medium severity score reflects that while availability and integrity impacts are limited, the confidentiality impact is high, which is critical for compliance with GDPR and other data protection regulations in Europe. Exploitation could result in reputational damage, regulatory fines, and operational disruptions if sensitive information is leaked or manipulated. Additionally, since the attack requires some user interaction, social engineering could be used to increase the success rate. Organizations relying heavily on Foxit's pdfonline service for document processing and eSignatures are at higher risk, especially those in sectors like finance, legal, and government where document confidentiality is paramount.

Mitigation Recommendations

European organizations should prioritize the following mitigations: 1) Monitor Foxit’s official channels for security patches and apply updates to pdfonline.foxit.com promptly once available. 2) Implement strict input validation and output encoding on all user-supplied data fields, especially in eSign workflows, to prevent script injection. 3) Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts within the web application. 4) Conduct regular security assessments and penetration testing focused on web application vulnerabilities, including stored XSS. 5) Educate users about the risks of interacting with untrusted documents or links, reducing the likelihood of successful social engineering. 6) Use web application firewalls (WAFs) configured to detect and block XSS payloads targeting the affected service. 7) Review and restrict user privileges to minimize the ability of low-privilege users to inject malicious content. 8) Log and monitor unusual activities related to document properties and predefined text usage to detect potential exploitation attempts early.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
Foxit
Date Reserved
2025-12-03T01:33:55.298Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6944ff0c19341fe1888b869e

Added to database: 12/19/2025, 7:30:20 AM

Last enriched: 12/19/2025, 7:32:03 AM

Last updated: 12/19/2025, 8:55:19 AM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats