CVE-2026-3774: CWE-200: Exposure of Sensitive Information to an Unauthorized Actor in Foxit Software Inc. Foxit PDF Editor
CVE-2026-3774 is a medium-severity vulnerability in Foxit PDF Editor versions 2025. 3 and earlier that allows sensitive information exposure due to incomplete redaction, encryption, or printing protections when PDF JavaScript or document/print actions update form fields, annotations, or optional content groups. This flaw can cause small amounts of sensitive content to remain visible or printed despite user expectations of removal or encryption. Exploitation requires local access with high attack complexity and user interaction, but no privileges. No known exploits are currently reported in the wild. Organizations relying on Foxit PDF Editor for sensitive document handling should be aware of potential data leakage risks and apply mitigations accordingly.
AI Analysis
Technical Summary
CVE-2026-3774 is a vulnerability identified in Foxit PDF Editor that arises from the way the application handles PDF JavaScript and document/print actions such as WillPrint and DidPrint. These actions can update form fields, annotations, or optional content groups (OCGs) immediately before or after redaction, encryption, or printing processes. The existing redaction, encryption, and printing logic does not fully account for these script-driven updates, which under certain document structures and user workflows, can lead to residual sensitive content not being properly removed or encrypted as intended. This results in a potential exposure of sensitive information either on screen or in printed output that differs from what was reviewed by the user. The vulnerability is classified under CWE-200 (Exposure of Sensitive Information to an Unauthorized Actor). The CVSS v3.1 base score is 4.7, reflecting a medium severity with an attack vector limited to local access, high attack complexity, no privileges required, and user interaction necessary. The scope is unchanged, and the impact is primarily on confidentiality, with no impact on integrity or availability. No public exploits have been reported yet, and no patches are currently linked, indicating that mitigation may require vendor updates or workarounds.
Potential Impact
The primary impact of CVE-2026-3774 is the unintended exposure of sensitive information that users expect to be redacted, encrypted, or securely printed. For organizations handling confidential or regulated data (e.g., legal, healthcare, finance), this vulnerability could lead to data leakage, violating privacy policies and regulatory compliance requirements such as GDPR or HIPAA. The exposure might be subtle, involving small amounts of data, but could still reveal critical information if exploited in targeted scenarios. Since exploitation requires local access and user interaction, the risk is mitigated somewhat but remains significant in environments where users handle sensitive PDFs frequently. Printed documents may also contain unexpected sensitive content, increasing the risk of physical data leakage. The vulnerability does not affect data integrity or system availability, but the confidentiality breach can undermine trust and lead to reputational damage or legal consequences.
Mitigation Recommendations
Organizations should immediately review their use of Foxit PDF Editor, especially versions 2025.3 and earlier, and restrict usage to trusted users with minimal exposure to untrusted PDF documents. Until a vendor patch is available, users should avoid relying solely on the application’s redaction and encryption features when handling highly sensitive information. Implement additional manual verification steps to confirm that redacted or encrypted content is fully removed before sharing or printing documents. Disable or restrict the use of PDF JavaScript and document/print actions within Foxit PDF Editor through application settings or group policies to prevent script-driven updates that bypass protections. Employ endpoint security controls to limit local access and monitor for suspicious PDF manipulation activities. Maintain awareness of vendor advisories for patches or updates addressing this vulnerability and apply them promptly once released.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, France, Japan, South Korea, India, Brazil
CVE-2026-3774: CWE-200: Exposure of Sensitive Information to an Unauthorized Actor in Foxit Software Inc. Foxit PDF Editor
Description
CVE-2026-3774 is a medium-severity vulnerability in Foxit PDF Editor versions 2025. 3 and earlier that allows sensitive information exposure due to incomplete redaction, encryption, or printing protections when PDF JavaScript or document/print actions update form fields, annotations, or optional content groups. This flaw can cause small amounts of sensitive content to remain visible or printed despite user expectations of removal or encryption. Exploitation requires local access with high attack complexity and user interaction, but no privileges. No known exploits are currently reported in the wild. Organizations relying on Foxit PDF Editor for sensitive document handling should be aware of potential data leakage risks and apply mitigations accordingly.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2026-3774 is a vulnerability identified in Foxit PDF Editor that arises from the way the application handles PDF JavaScript and document/print actions such as WillPrint and DidPrint. These actions can update form fields, annotations, or optional content groups (OCGs) immediately before or after redaction, encryption, or printing processes. The existing redaction, encryption, and printing logic does not fully account for these script-driven updates, which under certain document structures and user workflows, can lead to residual sensitive content not being properly removed or encrypted as intended. This results in a potential exposure of sensitive information either on screen or in printed output that differs from what was reviewed by the user. The vulnerability is classified under CWE-200 (Exposure of Sensitive Information to an Unauthorized Actor). The CVSS v3.1 base score is 4.7, reflecting a medium severity with an attack vector limited to local access, high attack complexity, no privileges required, and user interaction necessary. The scope is unchanged, and the impact is primarily on confidentiality, with no impact on integrity or availability. No public exploits have been reported yet, and no patches are currently linked, indicating that mitigation may require vendor updates or workarounds.
Potential Impact
The primary impact of CVE-2026-3774 is the unintended exposure of sensitive information that users expect to be redacted, encrypted, or securely printed. For organizations handling confidential or regulated data (e.g., legal, healthcare, finance), this vulnerability could lead to data leakage, violating privacy policies and regulatory compliance requirements such as GDPR or HIPAA. The exposure might be subtle, involving small amounts of data, but could still reveal critical information if exploited in targeted scenarios. Since exploitation requires local access and user interaction, the risk is mitigated somewhat but remains significant in environments where users handle sensitive PDFs frequently. Printed documents may also contain unexpected sensitive content, increasing the risk of physical data leakage. The vulnerability does not affect data integrity or system availability, but the confidentiality breach can undermine trust and lead to reputational damage or legal consequences.
Mitigation Recommendations
Organizations should immediately review their use of Foxit PDF Editor, especially versions 2025.3 and earlier, and restrict usage to trusted users with minimal exposure to untrusted PDF documents. Until a vendor patch is available, users should avoid relying solely on the application’s redaction and encryption features when handling highly sensitive information. Implement additional manual verification steps to confirm that redacted or encrypted content is fully removed before sharing or printing documents. Disable or restrict the use of PDF JavaScript and document/print actions within Foxit PDF Editor through application settings or group policies to prevent script-driven updates that bypass protections. Employ endpoint security controls to limit local access and monitor for suspicious PDF manipulation activities. Maintain awareness of vendor advisories for patches or updates addressing this vulnerability and apply them promptly once released.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Foxit
- Date Reserved
- 2026-03-08T03:42:24.474Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69cc7a8ee6bfc5ba1d854111
Added to database: 4/1/2026, 1:53:18 AM
Last enriched: 4/1/2026, 2:10:29 AM
Last updated: 4/1/2026, 4:59:51 AM
Views: 4
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.