Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-66519: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Foxit Software Inc. pdfonline.foxit.com

0
Medium
VulnerabilityCVE-2025-66519cvecve-2025-66519cwe-79
Published: Fri Dec 19 2025 (12/19/2025, 07:27:54 UTC)
Source: CVE Database V5
Vendor/Project: Foxit Software Inc.
Product: pdfonline.foxit.com

Description

A stored cross-site scripting (XSS) vulnerability exists in pdfonline.foxit.com within the Layer Import functionality. A crafted payload can be injected into the “Create new Layer” field during layer import and is later rendered into the DOM without proper sanitization. As a result, the injected script executes when the Layers panel is accessed.

AI-Powered Analysis

AILast updated: 12/19/2025, 08:49:39 UTC

Technical Analysis

CVE-2025-66519 is a stored cross-site scripting (XSS) vulnerability identified in Foxit Software Inc.'s online PDF service, pdfonline.foxit.com. The vulnerability resides in the Layer Import functionality, where the 'Create new Layer' input field improperly sanitizes user-supplied data. An attacker can craft a malicious payload and inject it into this field during the layer import process. Because the input is stored and later rendered directly into the Document Object Model (DOM) without adequate neutralization, the malicious script executes when a user accesses the Layers panel. This stored XSS flaw allows an attacker to execute arbitrary JavaScript in the context of the victim's browser session, potentially leading to theft of sensitive information such as authentication tokens, session cookies, or other confidential data. The vulnerability requires the attacker to have low privileges (PR:L) and user interaction (UI:R) to trigger the payload, but no physical access or elevated privileges are necessary. The CVSS 3.1 base score is 6.3, reflecting a medium severity with high confidentiality impact, low integrity impact, and no availability impact. No known exploits are currently reported in the wild, but the vulnerability is publicly disclosed and affects all versions of pdfonline.foxit.com before December 1, 2025. The lack of a patch link indicates that a fix may still be pending or in development. Given the widespread use of Foxit's PDF tools in enterprise and government sectors, this vulnerability poses a tangible risk if exploited.

Potential Impact

For European organizations, the exploitation of this stored XSS vulnerability could lead to unauthorized disclosure of sensitive information, including session tokens and confidential document data, compromising user accounts and internal workflows. Since pdfonline.foxit.com is a cloud-based service used for PDF manipulation, attackers could leverage this vulnerability to perform targeted attacks against employees or partners who access the Layers panel, potentially facilitating further phishing or lateral movement within networks. The medium severity score reflects moderate risk, but the high confidentiality impact is significant for sectors handling sensitive or regulated data, such as finance, healthcare, and government. The requirement for user interaction and low privilege reduces the likelihood of widespread automated exploitation but does not eliminate targeted attacks. Additionally, the absence of known exploits in the wild suggests that organizations have a window to implement mitigations before active exploitation occurs. However, failure to address this vulnerability could result in data breaches, reputational damage, and regulatory penalties under GDPR and other data protection laws.

Mitigation Recommendations

European organizations should prioritize the following measures: 1) Monitor Foxit Software Inc. announcements and promptly apply patches or updates once released to address CVE-2025-66519. 2) Implement strict input validation and sanitization controls on any user-generated content fields, especially those related to document layer creation or import, to prevent injection of malicious scripts. 3) Restrict access to the Layer Import functionality to trusted users only, minimizing exposure to untrusted or external actors. 4) Employ Content Security Policy (CSP) headers to limit the execution of unauthorized scripts within browsers accessing pdfonline.foxit.com. 5) Conduct user awareness training to recognize and report suspicious behavior related to document handling. 6) Monitor logs and network traffic for unusual activity associated with the Layers panel or PDF manipulation workflows. 7) Consider isolating or sandboxing browser sessions when accessing pdfonline.foxit.com to reduce the impact of potential XSS payloads. 8) Evaluate alternative PDF processing tools with stronger security postures if immediate patching is not feasible.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
Foxit
Date Reserved
2025-12-04T03:37:51.888Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69450fe2c326d36e5368d340

Added to database: 12/19/2025, 8:42:10 AM

Last enriched: 12/19/2025, 8:49:39 AM

Last updated: 12/19/2025, 11:09:55 AM

Views: 7

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats