Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-1592: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Foxit Software Inc. pdfonline.foxit.com

0
Medium
VulnerabilityCVE-2026-1592cvecve-2026-1592cwe-79
Published: Tue Feb 03 2026 (02/03/2026, 07:59:13 UTC)
Source: CVE Database V5
Vendor/Project: Foxit Software Inc.
Product: pdfonline.foxit.com

Description

Foxit PDF Editor Cloud (pdfonline) contains a stored cross-site scripting vulnerability in the Create New Layer feature. Unsanitized user input is embedded into the HTML output, allowing arbitrary JavaScript execution when the layer is referenced. This issue affects pdfonline.foxit.com: before 2026‑02‑03.

AI-Powered Analysis

AILast updated: 02/10/2026, 10:50:25 UTC

Technical Analysis

CVE-2026-1592 is a stored cross-site scripting (XSS) vulnerability identified in Foxit PDF Editor Cloud (pdfonline.foxit.com), specifically within the Create New Layer feature. The vulnerability arises because the application fails to properly sanitize user-supplied input before embedding it into the HTML output. When a user creates a new layer, malicious JavaScript code can be injected and stored persistently. This code executes whenever the layer is referenced or viewed, potentially allowing attackers to hijack user sessions, steal sensitive information, or perform actions on behalf of the victim. The vulnerability affects all versions of pdfonline.foxit.com prior to the patch date of 2026-02-03. According to the CVSS 3.1 vector (6.3), the attack vector is network-based, with low attack complexity, requiring low privileges and user interaction. The impact on confidentiality is high due to potential data leakage, while integrity impact is low and availability is unaffected. No public exploits have been reported yet, but the vulnerability poses a significant risk in environments where multiple users interact with PDF documents online. The flaw is classified under CWE-79, which covers improper neutralization of input during web page generation, a common cause of XSS vulnerabilities. This vulnerability highlights the importance of input validation and output encoding in web applications, especially those handling complex document workflows in cloud environments.

Potential Impact

For European organizations, this vulnerability could lead to unauthorized disclosure of sensitive information, including confidential document contents or user credentials, if exploited. Attackers could leverage the XSS flaw to execute malicious scripts in the context of legitimate users, potentially leading to session hijacking, phishing, or lateral movement within corporate networks. Organizations relying on Foxit PDF Editor Cloud for document collaboration and editing are at risk of data breaches and reputational damage. Since the vulnerability requires user interaction and low privileges, targeted phishing or social engineering campaigns could facilitate exploitation. The confidentiality impact is particularly concerning for sectors handling sensitive data such as finance, healthcare, and government. However, the lack of integrity and availability impact limits the scope of damage to data exposure rather than system disruption. The absence of known exploits in the wild currently reduces immediate risk but does not eliminate the threat, especially as attackers often develop exploits after public disclosure. European entities using this cloud service should prioritize remediation to prevent potential exploitation and comply with data protection regulations like GDPR.

Mitigation Recommendations

1. Apply the official patch or update from Foxit Software as soon as it becomes available to remediate the vulnerability. 2. Until patched, restrict access to the Create New Layer feature to trusted users only and limit permissions to reduce exposure. 3. Implement strict input validation and output encoding on all user-supplied data within the PDF editor environment to prevent injection of malicious scripts. 4. Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in the browser context. 5. Monitor application logs and user activity for unusual behavior indicative of XSS exploitation attempts. 6. Educate users about the risks of interacting with untrusted layers or documents and encourage cautious handling of shared PDFs. 7. Consider deploying web application firewalls (WAFs) with rules tuned to detect and block XSS payloads targeting the pdfonline.foxit.com domain. 8. Review and tighten authentication and session management controls to limit the impact of any potential session hijacking. 9. Conduct regular security assessments and penetration testing focused on web application vulnerabilities in document collaboration tools. 10. Maintain an incident response plan tailored to web-based attacks to enable rapid containment if exploitation occurs.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Foxit
Date Reserved
2026-01-29T07:31:16.225Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6981ae8df9fa50a62faf0c06

Added to database: 2/3/2026, 8:15:09 AM

Last enriched: 2/10/2026, 10:50:25 AM

Last updated: 3/19/2026, 4:15:41 AM

Views: 65

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses