Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-3777: CWE-416 Use after free in Foxit Software Inc. Foxit PDF Editor

0
Medium
VulnerabilityCVE-2026-3777cvecve-2026-3777cwe-416
Published: Wed Apr 01 2026 (04/01/2026, 01:40:27 UTC)
Source: CVE Database V5
Vendor/Project: Foxit Software Inc.
Product: Foxit PDF Editor

Description

CVE-2026-3777 is a use-after-free vulnerability in Foxit PDF Editor affecting versions 13. 2. 2 and earlier through 2025. 3. The flaw arises when JavaScript modifies the document zoom and triggers a page change, causing stale internal view cache pointers to be dereferenced after the original view object is destroyed. This can lead to a use-after-free condition, potentially allowing arbitrary code execution. Exploitation requires user interaction and local access, as the attack vector involves opening a malicious PDF with crafted JavaScript. The CVSS score is 5. 5 (medium severity) due to limited confidentiality and integrity impact but high availability impact. No known exploits are currently reported in the wild.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/01/2026, 02:10:08 UTC

Technical Analysis

CVE-2026-3777 is a use-after-free vulnerability identified in Foxit PDF Editor, a widely used PDF editing software. The vulnerability stems from improper validation of the lifetime and validity of internal view cache pointers when JavaScript within a PDF document modifies the zoom property and subsequently triggers a page change. Specifically, the original view object may be destroyed during this process, but stale pointers referencing the destroyed object remain and are later dereferenced. This use-after-free condition can be triggered by a crafted PDF containing malicious JavaScript and document structures, potentially leading to arbitrary code execution within the context of the user running the application. The vulnerability affects multiple versions of Foxit PDF Editor, including versions 13.2.2 and earlier, 14.0.2 and earlier, and 2025.3 and earlier. The CVSS v3.1 base score is 5.5, reflecting a medium severity level. The attack vector is local (AV:L), requires low attack complexity (AC:L), no privileges (PR:N), and user interaction (UI:R). The impact is primarily on availability (A:H), with no direct confidentiality or integrity impact reported. No patches or exploit code are currently publicly available, and no known exploits in the wild have been reported. The vulnerability was reserved in early March 2026 and published in April 2026. The root cause is classified under CWE-416 (Use After Free), a common memory corruption issue that can lead to program crashes or code execution if exploited successfully.

Potential Impact

The primary impact of CVE-2026-3777 is the potential for arbitrary code execution, which could allow an attacker to execute malicious code with the privileges of the user running Foxit PDF Editor. This could lead to system compromise, data loss, or disruption of business operations. Although the confidentiality and integrity impacts are rated as none, the availability impact is high because exploitation could cause application crashes or denial of service. Since exploitation requires user interaction (opening a malicious PDF), the risk is mitigated somewhat by user awareness and security controls. However, given the widespread use of PDF documents and the popularity of Foxit PDF Editor in enterprise environments, this vulnerability could be leveraged in targeted attacks or phishing campaigns. Organizations relying heavily on Foxit PDF Editor for document workflows may face operational disruptions and increased risk of malware infection if the vulnerability is exploited. The lack of known exploits in the wild currently reduces immediate risk, but the medium CVSS score and potential for code execution warrant proactive mitigation.

Mitigation Recommendations

1. Apply patches promptly once Foxit Software releases updates addressing CVE-2026-3777. Monitor vendor advisories closely. 2. Until patches are available, disable or restrict JavaScript execution within Foxit PDF Editor to prevent malicious scripts from triggering the vulnerability. 3. Implement strict email and document filtering to block or quarantine suspicious PDFs containing embedded JavaScript. 4. Educate users to avoid opening PDFs from untrusted or unknown sources, especially those prompting unusual interactions like zoom changes or page navigation. 5. Use endpoint protection solutions with behavioral detection to identify and block exploitation attempts targeting use-after-free vulnerabilities. 6. Employ application whitelisting and sandboxing techniques to limit the impact of potential code execution. 7. Regularly audit and update PDF handling policies and software versions across the organization to reduce exposure. 8. Monitor security forums and threat intelligence feeds for any emerging exploit code or attack campaigns leveraging this vulnerability.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Foxit
Date Reserved
2026-03-08T03:43:24.941Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69cc7a8ee6bfc5ba1d85411a

Added to database: 4/1/2026, 1:53:18 AM

Last enriched: 4/1/2026, 2:10:08 AM

Last updated: 4/1/2026, 5:52:31 AM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses