Skip to main content

CVE-2025-9328: CWE-125: Out-of-bounds Read in Foxit PDF Reader

High
VulnerabilityCVE-2025-9328cvecve-2025-9328cwe-125
Published: Tue Sep 02 2025 (09/02/2025, 20:09:04 UTC)
Source: CVE Database V5
Vendor/Project: Foxit
Product: PDF Reader

Description

Foxit PDF Reader PRC File Parsing Out-Of-Bounds Read Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PDF Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of PRC files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-26773.

AI-Powered Analysis

AILast updated: 09/02/2025, 20:48:07 UTC

Technical Analysis

CVE-2025-9328 is a high-severity vulnerability identified in Foxit PDF Reader version 2024.4.0.27683, specifically related to the parsing of PRC files. The vulnerability is classified as an out-of-bounds read (CWE-125), which occurs when the software reads data beyond the allocated buffer boundaries due to insufficient validation of user-supplied input. This flaw can be exploited remotely by an attacker who convinces a user to open a maliciously crafted PRC file or visit a malicious webpage containing such a file. Successful exploitation allows the attacker to execute arbitrary code within the context of the Foxit PDF Reader process, potentially leading to full compromise of the affected system. The vulnerability requires user interaction (opening a file or visiting a page) but does not require prior authentication or elevated privileges. The CVSS 3.0 base score is 7.8, reflecting high impact on confidentiality, integrity, and availability, with low attack complexity and no privileges required. Although no public exploits are currently known in the wild, the nature of the vulnerability and the widespread use of Foxit PDF Reader make this a significant threat. The vulnerability was reported by the Zero Day Initiative (ZDI) and is publicly disclosed as of September 2, 2025.

Potential Impact

For European organizations, this vulnerability poses a substantial risk given the widespread use of Foxit PDF Reader in both corporate and governmental environments for handling PDF documents. Exploitation could lead to unauthorized code execution, enabling attackers to steal sensitive information, install malware, or move laterally within networks. The requirement for user interaction means that phishing or social engineering campaigns could be effective vectors, increasing the risk in sectors with high document exchange such as finance, legal, and public administration. The high impact on confidentiality, integrity, and availability could disrupt business operations, lead to data breaches, and cause reputational damage. Given the critical nature of document workflows in European enterprises and regulatory requirements such as GDPR, exploitation could also result in significant compliance and legal consequences.

Mitigation Recommendations

Organizations should immediately verify the use of Foxit PDF Reader version 2024.4.0.27683 and plan to update to a patched version once available. Until a patch is released, implement strict email and web filtering to block or quarantine suspicious PRC files and related attachments. Educate users about the risks of opening unsolicited or unexpected PDF documents, especially those containing embedded PRC files. Employ endpoint protection solutions capable of detecting anomalous behaviors associated with exploitation attempts. Consider disabling or restricting the handling of PRC files within Foxit PDF Reader if possible. Network segmentation and application whitelisting can limit the impact of a successful exploit. Continuous monitoring for unusual process activity related to Foxit PDF Reader should be established to detect potential exploitation attempts early.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
zdi
Date Reserved
2025-08-21T19:50:19.917Z
Cvss Version
3.0
State
PUBLISHED

Threat ID: 68b7546fad5a09ad00e86ff9

Added to database: 9/2/2025, 8:32:47 PM

Last enriched: 9/2/2025, 8:48:07 PM

Last updated: 9/2/2025, 9:55:05 PM

Views: 3

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats