Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-66523: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Foxit Software Inc. na1.foxitesign.foxit.com

0
Medium
VulnerabilityCVE-2025-66523cvecve-2025-66523cwe-79
Published: Tue Jan 20 2026 (01/20/2026, 06:51:34 UTC)
Source: CVE Database V5
Vendor/Project: Foxit Software Inc.
Product: na1.foxitesign.foxit.com

Description

CVE-2025-66523 is a medium-severity cross-site scripting (XSS) vulnerability in Foxit Software Inc. 's na1. foxitesign. foxit. com platform. The flaw arises because URL parameters are embedded directly into JavaScript code or HTML attributes without proper sanitization or encoding. This allows attackers to craft malicious links that, when visited by authenticated users, execute arbitrary scripts within their browsers. The vulnerability affects all versions before 2026-01-16 and does not require authentication but does require user interaction (clicking the malicious link). Exploitation can lead to partial confidentiality and integrity impacts, such as session hijacking or unauthorized actions performed in the context of the victim user. No known exploits are currently in the wild.

AI-Powered Analysis

AILast updated: 01/20/2026, 07:20:14 UTC

Technical Analysis

CVE-2025-66523 is a cross-site scripting (XSS) vulnerability categorized under CWE-79, discovered in the Foxit Software Inc. service na1.foxitesign.foxit.com. The root cause is the improper neutralization of input during web page generation, specifically the direct embedding of URL parameters into JavaScript code or HTML attributes without adequate encoding or sanitization. This flaw allows an attacker to craft a malicious URL containing executable script code. When an authenticated user clicks such a crafted link, the injected script executes in the user's browser context, potentially leading to session hijacking, theft of sensitive information, or unauthorized actions performed with the user's privileges. The vulnerability affects all versions of the service before the patch date of 2026-01-16. According to the CVSS v3.1 score of 6.1, the vulnerability is of medium severity, with an attack vector of network (remote), low attack complexity, no privileges required, but requiring user interaction. The scope is changed, indicating that the vulnerability can affect resources beyond the initially vulnerable component. No public exploits have been reported yet, but the vulnerability poses a risk especially in environments where users are likely to receive and click on links, such as corporate email or messaging platforms. The vulnerability highlights the importance of proper input validation and output encoding in web applications, particularly those handling sensitive operations like electronic signatures.

Potential Impact

For European organizations, this XSS vulnerability could lead to unauthorized disclosure of sensitive information, such as session tokens or personal data, compromising confidentiality. Attackers could also manipulate the integrity of user interactions by performing actions on behalf of the user, such as altering documents or approvals within the Foxit e-signature platform. Although availability is not directly impacted, the trustworthiness of the service and user confidence could be undermined. Organizations relying on Foxit's e-signature services for legally binding document workflows may face compliance risks if attackers exploit this flaw to alter or intercept transactions. The requirement for user interaction means phishing or social engineering campaigns could be used to lure users into clicking malicious links. Given the widespread use of electronic signature solutions in sectors like finance, legal, and government across Europe, successful exploitation could disrupt critical business processes and lead to reputational damage and regulatory penalties under GDPR if personal data is compromised.

Mitigation Recommendations

Organizations should prioritize applying the official patch from Foxit Software as soon as it becomes available (post-2026-01-16). Until then, they should implement strict input validation and output encoding on any user-controllable inputs, especially URL parameters, to prevent script injection. Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in browsers. Educate users to be cautious about clicking on unsolicited or suspicious links, particularly those purporting to come from trusted internal sources. Monitor logs for unusual URL access patterns that might indicate attempted exploitation. If feasible, restrict access to the affected service to trusted networks or via VPN to reduce exposure. Additionally, consider deploying web application firewalls (WAFs) with rules designed to detect and block XSS payloads targeting this vulnerability. Regularly review and update security awareness training to include phishing and XSS risks related to document signing platforms.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Foxit
Date Reserved
2025-12-04T03:37:51.889Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 696f29544623b1157c1d8b46

Added to database: 1/20/2026, 7:05:56 AM

Last enriched: 1/20/2026, 7:20:14 AM

Last updated: 1/20/2026, 11:03:24 AM

Views: 8

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats