CVE-2025-66521: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Foxit Software Inc. pdfonline.foxit.com
A stored cross-site scripting (XSS) vulnerability exists in pdfonline.foxit.com within the Trusted Certificates feature. A crafted payload can be injected as the certificate name, which is later rendered into the DOM without proper sanitization. As a result, the injected script executes each time the Trusted Certificates view is loaded.
AI Analysis
Technical Summary
CVE-2025-66521 is a stored cross-site scripting (XSS) vulnerability identified in Foxit Software Inc.'s online PDF service, pdfonline.foxit.com, specifically within the Trusted Certificates feature. The vulnerability arises because the application improperly neutralizes input during web page generation (CWE-79). An attacker can inject a malicious script payload by submitting it as a certificate name. This payload is stored persistently and later rendered directly into the Document Object Model (DOM) without adequate sanitization or encoding. Consequently, whenever a user views the Trusted Certificates page, the malicious script executes in the context of their browser session. The vulnerability requires the attacker to have low privileges (PR:L) and user interaction (UI:R), such as tricking a user to view the compromised certificates page. The attack vector is network-based (AV:N), and the scope remains unchanged (S:U). The impact primarily affects confidentiality (C:H) by potentially exposing sensitive session data or credentials, with limited integrity impact (I:L) and no availability impact (A:N). No known exploits are currently reported in the wild, and the affected versions include all releases before December 1, 2025. The vulnerability highlights insufficient input validation and output encoding in a web application feature that handles user-supplied data, a common vector for XSS attacks. Given the persistent nature of stored XSS, this flaw can be exploited repeatedly once the malicious certificate name is stored. The lack of a patch link suggests that remediation is pending or in progress. Organizations relying on pdfonline.foxit.com should monitor for updates and consider interim mitigations.
Potential Impact
For European organizations, this vulnerability poses a significant risk to user confidentiality and session integrity when using Foxit's online PDF services. Exploitation could lead to session hijacking, theft of authentication tokens, or execution of unauthorized actions on behalf of the user. This is particularly concerning for sectors handling sensitive documents such as finance, legal, healthcare, and government agencies. The stored nature of the XSS means that once a malicious certificate name is injected, all users accessing the Trusted Certificates view are exposed, amplifying the potential impact. Although the vulnerability does not affect system availability, the compromise of user credentials or sensitive data could lead to broader security incidents, including data breaches or lateral movement within networks. The requirement for user interaction limits automated exploitation but does not eliminate risk, especially in environments where users frequently access the affected feature. The medium CVSS score reflects a moderate but non-trivial threat that should be addressed promptly to prevent exploitation.
Mitigation Recommendations
1. Apply official patches or updates from Foxit Software as soon as they become available to address the vulnerability directly. 2. Until patches are released, restrict access to the Trusted Certificates feature to trusted administrators only, minimizing exposure. 3. Implement strict input validation and sanitization on certificate name fields to prevent injection of malicious scripts. 4. Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in the browser context. 5. Conduct regular security audits and penetration testing focusing on web application input handling and output encoding. 6. Educate users about the risks of interacting with untrusted or suspicious certificate entries. 7. Monitor web application logs for unusual certificate name submissions or access patterns to detect potential exploitation attempts. 8. Consider deploying web application firewalls (WAFs) with rules targeting XSS payloads specific to this context. 9. Review and limit user privileges to reduce the ability of low-privileged users to inject malicious content. 10. Maintain an incident response plan to quickly address any detected exploitation.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands
CVE-2025-66521: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Foxit Software Inc. pdfonline.foxit.com
Description
A stored cross-site scripting (XSS) vulnerability exists in pdfonline.foxit.com within the Trusted Certificates feature. A crafted payload can be injected as the certificate name, which is later rendered into the DOM without proper sanitization. As a result, the injected script executes each time the Trusted Certificates view is loaded.
AI-Powered Analysis
Technical Analysis
CVE-2025-66521 is a stored cross-site scripting (XSS) vulnerability identified in Foxit Software Inc.'s online PDF service, pdfonline.foxit.com, specifically within the Trusted Certificates feature. The vulnerability arises because the application improperly neutralizes input during web page generation (CWE-79). An attacker can inject a malicious script payload by submitting it as a certificate name. This payload is stored persistently and later rendered directly into the Document Object Model (DOM) without adequate sanitization or encoding. Consequently, whenever a user views the Trusted Certificates page, the malicious script executes in the context of their browser session. The vulnerability requires the attacker to have low privileges (PR:L) and user interaction (UI:R), such as tricking a user to view the compromised certificates page. The attack vector is network-based (AV:N), and the scope remains unchanged (S:U). The impact primarily affects confidentiality (C:H) by potentially exposing sensitive session data or credentials, with limited integrity impact (I:L) and no availability impact (A:N). No known exploits are currently reported in the wild, and the affected versions include all releases before December 1, 2025. The vulnerability highlights insufficient input validation and output encoding in a web application feature that handles user-supplied data, a common vector for XSS attacks. Given the persistent nature of stored XSS, this flaw can be exploited repeatedly once the malicious certificate name is stored. The lack of a patch link suggests that remediation is pending or in progress. Organizations relying on pdfonline.foxit.com should monitor for updates and consider interim mitigations.
Potential Impact
For European organizations, this vulnerability poses a significant risk to user confidentiality and session integrity when using Foxit's online PDF services. Exploitation could lead to session hijacking, theft of authentication tokens, or execution of unauthorized actions on behalf of the user. This is particularly concerning for sectors handling sensitive documents such as finance, legal, healthcare, and government agencies. The stored nature of the XSS means that once a malicious certificate name is injected, all users accessing the Trusted Certificates view are exposed, amplifying the potential impact. Although the vulnerability does not affect system availability, the compromise of user credentials or sensitive data could lead to broader security incidents, including data breaches or lateral movement within networks. The requirement for user interaction limits automated exploitation but does not eliminate risk, especially in environments where users frequently access the affected feature. The medium CVSS score reflects a moderate but non-trivial threat that should be addressed promptly to prevent exploitation.
Mitigation Recommendations
1. Apply official patches or updates from Foxit Software as soon as they become available to address the vulnerability directly. 2. Until patches are released, restrict access to the Trusted Certificates feature to trusted administrators only, minimizing exposure. 3. Implement strict input validation and sanitization on certificate name fields to prevent injection of malicious scripts. 4. Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in the browser context. 5. Conduct regular security audits and penetration testing focusing on web application input handling and output encoding. 6. Educate users about the risks of interacting with untrusted or suspicious certificate entries. 7. Monitor web application logs for unusual certificate name submissions or access patterns to detect potential exploitation attempts. 8. Consider deploying web application firewalls (WAFs) with rules targeting XSS payloads specific to this context. 9. Review and limit user privileges to reduce the ability of low-privileged users to inject malicious content. 10. Maintain an incident response plan to quickly address any detected exploitation.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Foxit
- Date Reserved
- 2025-12-04T03:37:51.889Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69450fe2c326d36e5368d346
Added to database: 12/19/2025, 8:42:10 AM
Last enriched: 12/19/2025, 8:50:12 AM
Last updated: 12/19/2025, 11:13:58 AM
Views: 8
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-14847: CWE-130: Improper Handling of Length Parameter Inconsistency in MongoDB Inc. MongoDB Server
HighDLLs & TLS Callbacks, (Fri, Dec 19th)
MediumNorth Korea’s Digital Surge: $2B Stolen in Crypto as Amazon Blocks 1,800 Fake IT Workers
MediumCVE-2025-14455: CWE-862 Missing Authorization in wpchill Image Photo Gallery Final Tiles Grid
MediumCVE-2025-12361: CWE-862 Missing Authorization in saadiqbal myCred – Points Management System For Gamification, Ranks, Badges, and Loyalty Program.
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.