Skip to main content

CVE-2025-9330: CWE-427: Uncontrolled Search Path Element in Foxit PDF Reader

High
VulnerabilityCVE-2025-9330cvecve-2025-9330cwe-427
Published: Tue Sep 02 2025 (09/02/2025, 20:09:51 UTC)
Source: CVE Database V5
Vendor/Project: Foxit
Product: PDF Reader

Description

Foxit PDF Reader Update Service Uncontrolled Search Path Element Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of Foxit PDF Reader. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the Foxit Reader Update Service. The product loads a library from an unsecured location. An attacker can leverage this vulnerability to escalate privileges and execute code in the context of SYSTEM. Was ZDI-CAN-25709.

AI-Powered Analysis

AILast updated: 09/02/2025, 20:47:45 UTC

Technical Analysis

CVE-2025-9330 is a local privilege escalation vulnerability identified in the Foxit PDF Reader Update Service, specifically affecting version 2025.1.0.27937. The vulnerability arises from an uncontrolled search path element (CWE-427), where the update service loads a library from an insecure or untrusted location. This flaw allows a local attacker who already has the ability to execute low-privileged code on the target system to escalate their privileges to SYSTEM level. The vulnerability does not require user interaction but does require local access with some level of code execution capability. The attacker can place a malicious library in the search path, which the update service will load, thereby executing arbitrary code with elevated privileges. This can lead to full system compromise, including the ability to modify system files, install persistent malware, or disable security controls. The CVSS v3.0 score is 7.8, indicating a high severity with high impact on confidentiality, integrity, and availability. No known exploits are currently reported in the wild, but the vulnerability is publicly disclosed and could be targeted by attackers seeking to elevate privileges on systems running the affected Foxit Reader version.

Potential Impact

For European organizations, this vulnerability poses a significant risk, especially in environments where Foxit PDF Reader is widely deployed on workstations or servers. Successful exploitation could allow attackers to gain SYSTEM-level privileges, bypassing local security controls and potentially moving laterally within networks. This is particularly concerning for sectors with sensitive data such as finance, healthcare, government, and critical infrastructure. The ability to escalate privileges locally can facilitate ransomware deployment, data exfiltration, or sabotage of IT systems. Given that many European organizations use Foxit Reader as an alternative to Adobe Reader, the attack surface is non-trivial. Additionally, organizations with strict regulatory requirements under GDPR could face compliance issues if this vulnerability leads to data breaches or unauthorized access.

Mitigation Recommendations

Organizations should immediately verify if they are running the affected Foxit PDF Reader version 2025.1.0.27937 and prioritize upgrading to a patched version once available. Until a patch is released, mitigate risk by restricting local user permissions to prevent unauthorized code execution, especially in directories included in the update service's search path. Implement application whitelisting to prevent loading of unauthorized DLLs or libraries. Employ endpoint detection and response (EDR) solutions to monitor for suspicious local privilege escalation attempts. Additionally, review and harden the update service configuration to ensure it does not load libraries from insecure locations such as user-writable directories. Network segmentation and least privilege principles should be enforced to limit the impact of a compromised workstation. Regularly audit installed software versions and maintain an inventory of applications to quickly identify vulnerable instances.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
zdi
Date Reserved
2025-08-21T19:50:26.628Z
Cvss Version
3.0
State
PUBLISHED

Threat ID: 68b7546fad5a09ad00e87001

Added to database: 9/2/2025, 8:32:47 PM

Last enriched: 9/2/2025, 8:47:45 PM

Last updated: 9/2/2025, 9:55:08 PM

Views: 3

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats