Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-3776: CWE-476 NULL pointer dereference in Foxit Software Inc. Foxit PDF Editor

0
Medium
VulnerabilityCVE-2026-3776cvecve-2026-3776cwe-476
Published: Wed Apr 01 2026 (04/01/2026, 01:40:35 UTC)
Source: CVE Database V5
Vendor/Project: Foxit Software Inc.
Product: Foxit PDF Editor

Description

CVE-2026-3776 is a medium severity vulnerability in Foxit PDF Editor affecting versions 13. 2. 2 and earlier, 14. 0. 2 and earlier, and 2025. 3 and earlier. The flaw arises from the application not validating the presence of required appearance (AP) data before accessing stamp annotation resources in PDF files. A crafted PDF missing the AP entry in a stamp annotation can cause a null pointer dereference, leading to application crashes and denial of service. Exploitation requires user interaction to open a malicious PDF file, but no authentication is needed. There are no known exploits in the wild currently, and no patches have been linked yet.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/01/2026, 02:10:19 UTC

Technical Analysis

CVE-2026-3776 is a null pointer dereference vulnerability classified under CWE-476 found in Foxit Software Inc.'s Foxit PDF Editor. The vulnerability stems from the application's failure to verify the existence of the appearance (AP) entry in stamp annotations within PDF documents before dereferencing the associated object. Specifically, when a PDF contains a stamp annotation lacking the AP entry, the software proceeds to access this resource without performing a null or validity check, resulting in a null pointer dereference. This causes the application to crash, leading to a denial of service condition. The affected versions include 2025.3 and earlier, 14.0.2 and earlier, and 13.2.2 and earlier. The vulnerability requires user interaction, as the user must open a crafted malicious PDF file to trigger the crash. No privileges are required to exploit this issue, and the attack vector is local (AV:L), meaning the attacker must have access to the victim's environment to deliver the malicious file. The CVSS v3.1 base score is 5.5, reflecting a medium severity level, with impact limited to availability (A:H) and no impact on confidentiality or integrity. There are no known exploits in the wild, and no patches have been publicly released at the time of this report.

Potential Impact

The primary impact of CVE-2026-3776 is denial of service due to application crashes when processing maliciously crafted PDF files containing stamp annotations missing the required AP entry. For organizations, this can disrupt workflows that rely on Foxit PDF Editor for document handling, potentially causing productivity loss and operational interruptions. In environments where Foxit PDF Editor is integrated into automated document processing or used in critical business functions, repeated crashes could lead to service degradation or downtime. Although the vulnerability does not allow for code execution or data compromise, the availability impact can be significant in high-volume or sensitive document processing contexts. Attackers could exploit this vulnerability by distributing malicious PDFs via email or file sharing, targeting users to cause application crashes. Since no authentication is required, any user opening a malicious PDF is at risk. The lack of known exploits reduces immediate risk, but the presence of the vulnerability in widely used versions means organizations should remain vigilant.

Mitigation Recommendations

Organizations should implement several specific mitigations to reduce risk from CVE-2026-3776: 1) Restrict the opening of PDF files from untrusted or unknown sources, especially those received via email or downloaded from the internet. 2) Employ application whitelisting or sandboxing techniques to isolate Foxit PDF Editor processes, limiting the impact of crashes. 3) Monitor for updates and patches from Foxit Software Inc. and apply them promptly once available. 4) Use alternative PDF viewers with robust security controls for handling untrusted documents until a fix is released. 5) Educate users about the risks of opening suspicious PDF files and encourage verification of document sources. 6) Implement network-level protections such as email filtering and attachment scanning to detect and block malicious PDFs containing malformed annotations. 7) Consider deploying endpoint detection and response (EDR) solutions that can detect abnormal application crashes or behaviors related to PDF processing. These targeted mitigations go beyond generic advice by focusing on controlling document sources, isolating vulnerable applications, and preparing for patch deployment.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Foxit
Date Reserved
2026-03-08T03:43:23.264Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69cc7a8ee6bfc5ba1d854117

Added to database: 4/1/2026, 1:53:18 AM

Last enriched: 4/1/2026, 2:10:19 AM

Last updated: 4/1/2026, 6:21:09 AM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses