Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-9327: CWE-125: Out-of-bounds Read in Foxit PDF Reader

0
Low
VulnerabilityCVE-2025-9327cvecve-2025-9327cwe-125
Published: Tue Sep 02 2025 (09/02/2025, 20:09:11 UTC)
Source: CVE Database V5
Vendor/Project: Foxit
Product: PDF Reader

Description

Foxit PDF Reader PRC File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of Foxit PDF Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of PRC files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-26774.

AI-Powered Analysis

AILast updated: 09/09/2025, 21:53:37 UTC

Technical Analysis

CVE-2025-9327 is a security vulnerability identified in Foxit PDF Reader version 2024.4.0.27683. The flaw is an out-of-bounds read (CWE-125) occurring during the parsing of PRC files, which are a type of embedded 3D content within PDFs. Specifically, the vulnerability arises because the software fails to properly validate user-supplied data when processing PRC file structures, leading to reading beyond the allocated buffer boundaries. This out-of-bounds read can cause information disclosure by leaking sensitive memory contents to an attacker. Exploitation requires user interaction, such as opening a maliciously crafted PDF file or visiting a malicious webpage that triggers the vulnerable parsing code. Although the immediate impact is limited to information disclosure, the vulnerability can be chained with other exploits to achieve arbitrary code execution within the context of the Foxit PDF Reader process. The CVSS v3.0 base score is 3.3, indicating a low severity primarily due to the requirement for user interaction and limited impact scope (confidentiality only). No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability was assigned and published by the Zero Day Initiative (ZDI) under the identifier ZDI-CAN-26774.

Potential Impact

For European organizations, this vulnerability poses a moderate risk primarily to confidentiality of information. Since Foxit PDF Reader is widely used across enterprises and government agencies in Europe for handling PDF documents, an attacker could leverage this flaw to extract sensitive data from memory, potentially including fragments of documents or application data. The requirement for user interaction limits mass exploitation but targeted spear-phishing campaigns or malicious document distribution could be effective attack vectors. The possibility of chaining this vulnerability with others to achieve code execution raises concerns for advanced persistent threat (APT) actors targeting high-value European entities. Confidentiality breaches could lead to exposure of intellectual property, personal data protected under GDPR, or internal communications. However, the lack of impact on integrity or availability and the low CVSS score suggest the immediate threat level is limited. Organizations handling sensitive or regulated data should still consider this vulnerability significant due to the potential for information leakage and subsequent escalation.

Mitigation Recommendations

European organizations should implement the following specific mitigations: 1) Update Foxit PDF Reader to the latest version as soon as a patch addressing CVE-2025-9327 is released by the vendor. 2) Employ application whitelisting and restrict the execution of untrusted or unknown PDF files, especially those containing embedded 3D content like PRC files. 3) Educate users about the risks of opening PDF attachments or links from untrusted sources to reduce the likelihood of successful exploitation via social engineering. 4) Utilize endpoint detection and response (EDR) tools to monitor for anomalous behavior associated with PDF reader processes, such as unexpected memory access patterns or network connections. 5) Consider disabling or restricting PRC file parsing features in Foxit PDF Reader if feasible, or use alternative PDF readers with a lower attack surface for handling sensitive documents. 6) Implement network-level protections such as sandboxing or email gateway scanning to detect and block malicious PDF files before reaching end users. These targeted measures go beyond generic advice by focusing on the specific attack vector and exploitation requirements of this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
zdi
Date Reserved
2025-08-21T19:50:16.171Z
Cvss Version
3.0
State
PUBLISHED

Threat ID: 68b7546fad5a09ad00e86ff5

Added to database: 9/2/2025, 8:32:47 PM

Last enriched: 9/9/2025, 9:53:37 PM

Last updated: 10/18/2025, 9:16:48 AM

Views: 58

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats