CVE-2025-66521: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Foxit Software Inc. pdfonline.foxit.com
A stored cross-site scripting (XSS) vulnerability exists in pdfonline.foxit.com within the Trusted Certificates feature. A crafted payload can be injected as the certificate name, which is later rendered into the DOM without proper sanitization. As a result, the injected script executes each time the Trusted Certificates view is loaded.
AI Analysis
Technical Summary
CVE-2025-66521 is a stored cross-site scripting (XSS) vulnerability identified in the Trusted Certificates feature of Foxit Software Inc.'s pdfonline.foxit.com platform. The vulnerability arises because the application improperly neutralizes input during web page generation, specifically failing to sanitize the certificate name field before rendering it into the Document Object Model (DOM). An attacker with low privileges can inject a crafted payload as a certificate name, which is persistently stored and executed every time the Trusted Certificates view is accessed by any user. This persistent XSS flaw allows execution of arbitrary JavaScript in the context of the victim's browser session, potentially leading to theft of sensitive information such as authentication tokens, cookies, or other confidential data. The CVSS v3.1 score of 6.3 reflects a medium severity, with the vector indicating network attack vector (AV:N), low attack complexity (AC:L), requiring privileges (PR:L), user interaction (UI:R), unchanged scope (S:U), high confidentiality impact (C:H), low integrity impact (I:L), and no availability impact (A:N). The vulnerability affects all versions of pdfonline.foxit.com before December 1, 2025. No public exploits have been reported yet, but the nature of stored XSS makes it a significant risk for phishing, session hijacking, or further exploitation within affected environments. The lack of proper input validation and output encoding in the Trusted Certificates feature is the root cause. Since this is a web-based service, the attack surface includes all users who access the Trusted Certificates page, making it a concern for organizations relying on Foxit's online PDF tools for certificate management or document workflows.
Potential Impact
For European organizations, this vulnerability poses a risk to confidentiality primarily, as attackers can steal session cookies, tokens, or other sensitive data from users accessing the Trusted Certificates feature. This can lead to account compromise, unauthorized access to sensitive documents, or lateral movement within an organization's network if credentials are harvested. The integrity impact is low but could enable attackers to inject misleading or malicious content into the user interface, potentially facilitating social engineering or phishing attacks. Availability is not affected. Organizations in sectors with high reliance on digital document workflows, such as finance, legal, healthcare, and government, are at greater risk due to the sensitive nature of their documents and certificates. The requirement for user interaction and low privileges means that insider threats or phishing campaigns could exploit this vulnerability. Given the widespread use of Foxit products in Europe, the vulnerability could impact a broad user base, increasing the potential for targeted attacks against European enterprises and public sector entities.
Mitigation Recommendations
1. Apply patches or updates from Foxit Software Inc. as soon as they become available to address this vulnerability. 2. In the interim, restrict or sanitize user input for certificate names on the server side to prevent injection of malicious scripts. 3. Implement strict Content Security Policy (CSP) headers to limit the execution of unauthorized scripts in the browser context. 4. Conduct regular security reviews and penetration testing focused on input validation and output encoding in web applications, especially those handling certificates or sensitive data. 5. Educate users about the risks of interacting with untrusted or suspicious certificate entries and encourage reporting of anomalies. 6. Monitor web application logs for unusual activity related to the Trusted Certificates feature to detect potential exploitation attempts. 7. Consider isolating or restricting access to the Trusted Certificates view to trusted administrators only, reducing the attack surface. 8. Employ web application firewalls (WAF) with rules designed to detect and block XSS payloads targeting this feature.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain
CVE-2025-66521: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Foxit Software Inc. pdfonline.foxit.com
Description
A stored cross-site scripting (XSS) vulnerability exists in pdfonline.foxit.com within the Trusted Certificates feature. A crafted payload can be injected as the certificate name, which is later rendered into the DOM without proper sanitization. As a result, the injected script executes each time the Trusted Certificates view is loaded.
AI-Powered Analysis
Technical Analysis
CVE-2025-66521 is a stored cross-site scripting (XSS) vulnerability identified in the Trusted Certificates feature of Foxit Software Inc.'s pdfonline.foxit.com platform. The vulnerability arises because the application improperly neutralizes input during web page generation, specifically failing to sanitize the certificate name field before rendering it into the Document Object Model (DOM). An attacker with low privileges can inject a crafted payload as a certificate name, which is persistently stored and executed every time the Trusted Certificates view is accessed by any user. This persistent XSS flaw allows execution of arbitrary JavaScript in the context of the victim's browser session, potentially leading to theft of sensitive information such as authentication tokens, cookies, or other confidential data. The CVSS v3.1 score of 6.3 reflects a medium severity, with the vector indicating network attack vector (AV:N), low attack complexity (AC:L), requiring privileges (PR:L), user interaction (UI:R), unchanged scope (S:U), high confidentiality impact (C:H), low integrity impact (I:L), and no availability impact (A:N). The vulnerability affects all versions of pdfonline.foxit.com before December 1, 2025. No public exploits have been reported yet, but the nature of stored XSS makes it a significant risk for phishing, session hijacking, or further exploitation within affected environments. The lack of proper input validation and output encoding in the Trusted Certificates feature is the root cause. Since this is a web-based service, the attack surface includes all users who access the Trusted Certificates page, making it a concern for organizations relying on Foxit's online PDF tools for certificate management or document workflows.
Potential Impact
For European organizations, this vulnerability poses a risk to confidentiality primarily, as attackers can steal session cookies, tokens, or other sensitive data from users accessing the Trusted Certificates feature. This can lead to account compromise, unauthorized access to sensitive documents, or lateral movement within an organization's network if credentials are harvested. The integrity impact is low but could enable attackers to inject misleading or malicious content into the user interface, potentially facilitating social engineering or phishing attacks. Availability is not affected. Organizations in sectors with high reliance on digital document workflows, such as finance, legal, healthcare, and government, are at greater risk due to the sensitive nature of their documents and certificates. The requirement for user interaction and low privileges means that insider threats or phishing campaigns could exploit this vulnerability. Given the widespread use of Foxit products in Europe, the vulnerability could impact a broad user base, increasing the potential for targeted attacks against European enterprises and public sector entities.
Mitigation Recommendations
1. Apply patches or updates from Foxit Software Inc. as soon as they become available to address this vulnerability. 2. In the interim, restrict or sanitize user input for certificate names on the server side to prevent injection of malicious scripts. 3. Implement strict Content Security Policy (CSP) headers to limit the execution of unauthorized scripts in the browser context. 4. Conduct regular security reviews and penetration testing focused on input validation and output encoding in web applications, especially those handling certificates or sensitive data. 5. Educate users about the risks of interacting with untrusted or suspicious certificate entries and encourage reporting of anomalies. 6. Monitor web application logs for unusual activity related to the Trusted Certificates feature to detect potential exploitation attempts. 7. Consider isolating or restricting access to the Trusted Certificates view to trusted administrators only, reducing the attack surface. 8. Employ web application firewalls (WAF) with rules designed to detect and block XSS payloads targeting this feature.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Foxit
- Date Reserved
- 2025-12-04T03:37:51.889Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69450fe2c326d36e5368d346
Added to database: 12/19/2025, 8:42:10 AM
Last enriched: 12/26/2025, 9:15:20 AM
Last updated: 2/6/2026, 12:53:35 PM
Views: 109
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2054: Information Disclosure in D-Link DIR-605L
MediumCVE-2026-2018: SQL Injection in itsourcecode School Management System
MediumLiving off the AI: The Next Evolution of Attacker Tradecraft
MediumFlickr Security Incident Tied to Third-Party Email System
MediumCVE-2026-2017: Stack-based Buffer Overflow in IP-COM W30AP
CriticalActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.