CVE-2025-66519: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Foxit Software Inc. pdfonline.foxit.com
A stored cross-site scripting (XSS) vulnerability exists in pdfonline.foxit.com within the Layer Import functionality. A crafted payload can be injected into the “Create new Layer” field during layer import and is later rendered into the DOM without proper sanitization. As a result, the injected script executes when the Layers panel is accessed.
AI Analysis
Technical Summary
CVE-2025-66519 is a stored cross-site scripting (XSS) vulnerability identified in Foxit Software Inc.'s online PDF service, pdfonline.foxit.com. The vulnerability resides in the Layer Import functionality, where the 'Create new Layer' input field improperly sanitizes user-supplied data. An attacker can craft a malicious payload and inject it into this field during the layer import process. Because the input is stored and later rendered directly into the Document Object Model (DOM) without adequate neutralization, the malicious script executes when a user accesses the Layers panel. This stored XSS flaw allows an attacker to execute arbitrary JavaScript in the context of the victim's browser session, potentially leading to theft of sensitive information such as authentication tokens, session cookies, or other confidential data. The vulnerability requires the attacker to have low privileges (PR:L) and user interaction (UI:R) to trigger the payload, but no physical access or elevated privileges are necessary. The CVSS 3.1 base score is 6.3, reflecting a medium severity with high confidentiality impact, low integrity impact, and no availability impact. No known exploits are currently reported in the wild, but the vulnerability is publicly disclosed and affects all versions of pdfonline.foxit.com before December 1, 2025. The lack of a patch link indicates that a fix may still be pending or in development. Given the widespread use of Foxit's PDF tools in enterprise and government sectors, this vulnerability poses a tangible risk if exploited.
Potential Impact
For European organizations, the exploitation of this stored XSS vulnerability could lead to unauthorized disclosure of sensitive information, including session tokens and confidential document data, compromising user accounts and internal workflows. Since pdfonline.foxit.com is a cloud-based service used for PDF manipulation, attackers could leverage this vulnerability to perform targeted attacks against employees or partners who access the Layers panel, potentially facilitating further phishing or lateral movement within networks. The medium severity score reflects moderate risk, but the high confidentiality impact is significant for sectors handling sensitive or regulated data, such as finance, healthcare, and government. The requirement for user interaction and low privilege reduces the likelihood of widespread automated exploitation but does not eliminate targeted attacks. Additionally, the absence of known exploits in the wild suggests that organizations have a window to implement mitigations before active exploitation occurs. However, failure to address this vulnerability could result in data breaches, reputational damage, and regulatory penalties under GDPR and other data protection laws.
Mitigation Recommendations
European organizations should prioritize the following measures: 1) Monitor Foxit Software Inc. announcements and promptly apply patches or updates once released to address CVE-2025-66519. 2) Implement strict input validation and sanitization controls on any user-generated content fields, especially those related to document layer creation or import, to prevent injection of malicious scripts. 3) Restrict access to the Layer Import functionality to trusted users only, minimizing exposure to untrusted or external actors. 4) Employ Content Security Policy (CSP) headers to limit the execution of unauthorized scripts within browsers accessing pdfonline.foxit.com. 5) Conduct user awareness training to recognize and report suspicious behavior related to document handling. 6) Monitor logs and network traffic for unusual activity associated with the Layers panel or PDF manipulation workflows. 7) Consider isolating or sandboxing browser sessions when accessing pdfonline.foxit.com to reduce the impact of potential XSS payloads. 8) Evaluate alternative PDF processing tools with stronger security postures if immediate patching is not feasible.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain
CVE-2025-66519: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Foxit Software Inc. pdfonline.foxit.com
Description
A stored cross-site scripting (XSS) vulnerability exists in pdfonline.foxit.com within the Layer Import functionality. A crafted payload can be injected into the “Create new Layer” field during layer import and is later rendered into the DOM without proper sanitization. As a result, the injected script executes when the Layers panel is accessed.
AI-Powered Analysis
Technical Analysis
CVE-2025-66519 is a stored cross-site scripting (XSS) vulnerability identified in Foxit Software Inc.'s online PDF service, pdfonline.foxit.com. The vulnerability resides in the Layer Import functionality, where the 'Create new Layer' input field improperly sanitizes user-supplied data. An attacker can craft a malicious payload and inject it into this field during the layer import process. Because the input is stored and later rendered directly into the Document Object Model (DOM) without adequate neutralization, the malicious script executes when a user accesses the Layers panel. This stored XSS flaw allows an attacker to execute arbitrary JavaScript in the context of the victim's browser session, potentially leading to theft of sensitive information such as authentication tokens, session cookies, or other confidential data. The vulnerability requires the attacker to have low privileges (PR:L) and user interaction (UI:R) to trigger the payload, but no physical access or elevated privileges are necessary. The CVSS 3.1 base score is 6.3, reflecting a medium severity with high confidentiality impact, low integrity impact, and no availability impact. No known exploits are currently reported in the wild, but the vulnerability is publicly disclosed and affects all versions of pdfonline.foxit.com before December 1, 2025. The lack of a patch link indicates that a fix may still be pending or in development. Given the widespread use of Foxit's PDF tools in enterprise and government sectors, this vulnerability poses a tangible risk if exploited.
Potential Impact
For European organizations, the exploitation of this stored XSS vulnerability could lead to unauthorized disclosure of sensitive information, including session tokens and confidential document data, compromising user accounts and internal workflows. Since pdfonline.foxit.com is a cloud-based service used for PDF manipulation, attackers could leverage this vulnerability to perform targeted attacks against employees or partners who access the Layers panel, potentially facilitating further phishing or lateral movement within networks. The medium severity score reflects moderate risk, but the high confidentiality impact is significant for sectors handling sensitive or regulated data, such as finance, healthcare, and government. The requirement for user interaction and low privilege reduces the likelihood of widespread automated exploitation but does not eliminate targeted attacks. Additionally, the absence of known exploits in the wild suggests that organizations have a window to implement mitigations before active exploitation occurs. However, failure to address this vulnerability could result in data breaches, reputational damage, and regulatory penalties under GDPR and other data protection laws.
Mitigation Recommendations
European organizations should prioritize the following measures: 1) Monitor Foxit Software Inc. announcements and promptly apply patches or updates once released to address CVE-2025-66519. 2) Implement strict input validation and sanitization controls on any user-generated content fields, especially those related to document layer creation or import, to prevent injection of malicious scripts. 3) Restrict access to the Layer Import functionality to trusted users only, minimizing exposure to untrusted or external actors. 4) Employ Content Security Policy (CSP) headers to limit the execution of unauthorized scripts within browsers accessing pdfonline.foxit.com. 5) Conduct user awareness training to recognize and report suspicious behavior related to document handling. 6) Monitor logs and network traffic for unusual activity associated with the Layers panel or PDF manipulation workflows. 7) Consider isolating or sandboxing browser sessions when accessing pdfonline.foxit.com to reduce the impact of potential XSS payloads. 8) Evaluate alternative PDF processing tools with stronger security postures if immediate patching is not feasible.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Foxit
- Date Reserved
- 2025-12-04T03:37:51.888Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69450fe2c326d36e5368d340
Added to database: 12/19/2025, 8:42:10 AM
Last enriched: 12/19/2025, 8:49:39 AM
Last updated: 12/19/2025, 11:09:55 AM
Views: 7
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-14847: CWE-130: Improper Handling of Length Parameter Inconsistency in MongoDB Inc. MongoDB Server
HighDLLs & TLS Callbacks, (Fri, Dec 19th)
MediumNorth Korea’s Digital Surge: $2B Stolen in Crypto as Amazon Blocks 1,800 Fake IT Workers
MediumCVE-2025-14455: CWE-862 Missing Authorization in wpchill Image Photo Gallery Final Tiles Grid
MediumCVE-2025-12361: CWE-862 Missing Authorization in saadiqbal myCred – Points Management System For Gamification, Ranks, Badges, and Loyalty Program.
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.