Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-66522: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Foxit Software Inc. pdfonline.foxit.com

0
Medium
VulnerabilityCVE-2025-66522cvecve-2025-66522cwe-79
Published: Fri Dec 19 2025 (12/19/2025, 07:34:29 UTC)
Source: CVE Database V5
Vendor/Project: Foxit Software Inc.
Product: pdfonline.foxit.com

Description

A stored cross-site scripting (XSS) vulnerability exists in the Digital IDs functionality of the Foxit PDF Editor Cloud (pdfonline.foxit.com). The application does not properly sanitize or encode the Common Name field of Digital IDs before inserting user-supplied content into the DOM. As a result, embedded HTML or JavaScript may execute whenever the Digital IDs dialog is accessed or when the affected PDF is loaded.

AI-Powered Analysis

AILast updated: 12/26/2025, 09:18:01 UTC

Technical Analysis

CVE-2025-66522 is a stored cross-site scripting (XSS) vulnerability identified in the Digital IDs functionality of Foxit Software Inc.'s pdfonline.foxit.com, part of the Foxit PDF Editor Cloud service. The vulnerability stems from improper neutralization of input (CWE-79) in the Common Name field of Digital IDs, where user-supplied content is inserted into the Document Object Model (DOM) without adequate sanitization or encoding. This allows attackers to embed malicious HTML or JavaScript code that executes when the Digital IDs dialog is opened or when the affected PDF document is loaded. The flaw affects all versions of the product prior to December 1, 2025. The CVSS v3.1 base score is 6.3, reflecting medium severity with an attack vector of network (AV:N), low attack complexity (AC:L), requiring privileges (PR:L), and user interaction (UI:R). The impact primarily compromises confidentiality (C:H) with limited integrity impact (I:L) and no availability impact (A:N). No public exploits are known at this time. The vulnerability could be exploited by authenticated users who can submit malicious input into the Digital IDs Common Name field, potentially leading to session hijacking, credential theft, or unauthorized actions executed in the context of the victim's browser session. Since the vulnerability is stored, the malicious payload persists and triggers upon access to the Digital IDs dialog or loading the affected PDF, increasing the risk of widespread impact if exploited in shared or collaborative environments. The vulnerability highlights the importance of proper input validation and output encoding in web applications, especially those handling sensitive document workflows.

Potential Impact

For European organizations, this vulnerability poses a significant risk to the confidentiality of sensitive information handled via the Foxit PDF Editor Cloud. Attackers exploiting this XSS flaw could execute arbitrary scripts in the context of authenticated users, potentially stealing session tokens, credentials, or other sensitive data. This could lead to unauthorized access to corporate documents or systems integrated with the PDF editor. Given the collaborative nature of document workflows in many enterprises, the stored nature of the XSS increases the likelihood of multiple users being affected once a malicious payload is injected. While the integrity and availability impacts are limited, the breach of confidentiality could have regulatory implications under GDPR, especially if personal or sensitive data is exposed. The requirement for low privileges and user interaction means insider threats or phishing-assisted attacks could leverage this vulnerability effectively. Organizations relying heavily on cloud-based document editing and digital ID features in PDFs are particularly at risk, potentially affecting sectors such as finance, legal, and government services across Europe.

Mitigation Recommendations

1. Apply patches or updates from Foxit Software Inc. as soon as they become available to address CVE-2025-66522. 2. Until patches are released, restrict access to the Digital IDs functionality within pdfonline.foxit.com to trusted users only, minimizing exposure. 3. Implement additional input validation and output encoding on the Common Name field at the application or proxy level to neutralize potentially malicious input. 4. Employ Content Security Policy (CSP) headers to limit the execution of unauthorized scripts within the application context. 5. Educate users about the risks of interacting with untrusted PDFs or Digital IDs dialogs, especially in shared environments. 6. Monitor logs and user activity for unusual behavior indicative of XSS exploitation attempts. 7. Consider isolating or sandboxing the PDF editor environment to contain potential script execution impacts. 8. Review and enhance incident response plans to include scenarios involving stored XSS in document management systems.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Foxit
Date Reserved
2025-12-04T03:37:51.889Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69450fe2c326d36e5368d349

Added to database: 12/19/2025, 8:42:10 AM

Last enriched: 12/26/2025, 9:18:01 AM

Last updated: 2/7/2026, 9:45:54 PM

Views: 98

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats