Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-3775: CWE-427: DLL Hijacking in Foxit Software Inc. Foxit PDF Editor

0
High
VulnerabilityCVE-2026-3775cvecve-2026-3775cwe-427
Published: Wed Apr 01 2026 (04/01/2026, 01:40:36 UTC)
Source: CVE Database V5
Vendor/Project: Foxit Software Inc.
Product: Foxit PDF Editor

Description

CVE-2026-3775 is a high-severity DLL hijacking vulnerability in Foxit PDF Editor versions 2025. 3 and earlier. The application's update service loads system libraries from search paths that include directories writable by low-privileged users. This insecure library loading allows a local attacker to place a malicious DLL in these directories, which the update service then loads with SYSTEM privileges. Exploiting this flaw results in local privilege escalation and arbitrary code execution without requiring user interaction. The vulnerability has a CVSS score of 7. 8, reflecting its significant impact on confidentiality, integrity, and availability. No known exploits are currently reported in the wild. Organizations using affected Foxit PDF Editor versions should prioritize patching or apply mitigations to restrict write permissions on vulnerable directories. This threat primarily affects environments where Foxit PDF Editor is widely deployed, including the United States, China, Germany, Japan, and the United Kingdom.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/01/2026, 02:09:14 UTC

Technical Analysis

CVE-2026-3775 is a DLL hijacking vulnerability classified under CWE-427, affecting Foxit Software Inc.'s Foxit PDF Editor, specifically versions 2025.3 and earlier. The vulnerability arises because the application's update service, responsible for checking and applying updates, loads certain system libraries from a search path that includes directories writable by low-privileged users. This insecure practice violates the principle of loading libraries only from trusted system locations. A local attacker with write access to these directories can place a malicious DLL with the same name as a legitimate system library. When the update service runs, it loads the attacker's DLL with SYSTEM privileges, leading to local privilege escalation and arbitrary code execution. The vulnerability does not require user interaction but does require local access with limited privileges. The CVSS v3.1 score of 7.8 reflects high impact on confidentiality, integrity, and availability, with low attack complexity and low privileges required. No patches are currently linked, and no exploits are known in the wild, but the vulnerability poses a significant risk due to the elevated privileges gained upon exploitation. The flaw is rooted in improper library search path handling, a common security weakness that can be mitigated by enforcing strict DLL loading policies and securing writable directories.

Potential Impact

The impact of CVE-2026-3775 is substantial for organizations using vulnerable versions of Foxit PDF Editor. Successful exploitation grants an attacker SYSTEM-level privileges on the affected machine, enabling full control over the system. This can lead to unauthorized access to sensitive data, installation of persistent malware, disruption of services, and lateral movement within networks. Since the vulnerability requires local access, it is particularly dangerous in environments where multiple users share systems or where attackers have gained initial footholds with limited privileges. The arbitrary code execution capability can facilitate further attacks, including data exfiltration, ransomware deployment, or sabotage. Given the widespread use of Foxit PDF Editor in corporate, government, and educational institutions, the vulnerability could be leveraged to compromise critical endpoints and infrastructure. The absence of known exploits in the wild suggests a window for proactive mitigation before widespread attacks occur.

Mitigation Recommendations

To mitigate CVE-2026-3775, organizations should first apply any official patches or updates from Foxit Software once available. In the absence of patches, administrators should audit and restrict write permissions on directories included in the DLL search path used by the Foxit PDF Editor update service, ensuring that only trusted users and system processes have write access. Implement application whitelisting and code integrity policies to prevent unauthorized DLLs from loading. Employ endpoint detection and response (EDR) solutions to monitor for suspicious DLL loading behavior and privilege escalation attempts. Additionally, consider running the update service with the least privileges necessary, if configurable, to limit the impact of potential exploitation. Regularly review and harden local user permissions to minimize the risk of local attackers placing malicious files. Educate users about the risks of local privilege escalation and maintain robust local access controls. Network segmentation can also limit the spread of an attacker who gains elevated privileges on one system.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Foxit
Date Reserved
2026-03-08T03:42:27.208Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69cc7a8ee6bfc5ba1d854114

Added to database: 4/1/2026, 1:53:18 AM

Last enriched: 4/1/2026, 2:09:14 AM

Last updated: 4/1/2026, 6:13:07 AM

Views: 9

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses