CVE-2025-59802

EUVD-2025-202693
Foxit PDF Editor and Reader before 2025.2.1 allow signature spoofing via OCG. When Optional Content Groups (OCG) are supported, the state property of an OCG is runtime-only and not included in the digital signature computation buffer. An attacker can leverage JavaScript or PDF triggers to dynamically change the visibility of OCG content after signing (Post-Sign), allowing the visual content of a signed PDF to be modified without invalidating the signature. This may result in a mismatch between the signed content and what the signer or verifier sees, undermining the trustworthiness of the digital signature. The fixed versions are 2025.2.1, 14.0.1, and 13.2.1.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
7.5 HIGH
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
CISA-ADPADP
7.5 HIGH
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
Base Score
CVSS 3.x
EPSS Score
Percentile: 13%
Affected Products (NVD)
VendorProductVersion
foxitpdf_editor
𝑥
≤ 13.2.0.63256
foxitpdf_editor
2023.1.0.55583 ≤
𝑥
≤ 2023.3.0.63083
foxitpdf_editor
2024.1.0.63682 ≤
𝑥
≤ 2024.4.1.66479
foxitpdf_editor
14.0.0.68868
foxitpdf_editor
2025.1.0.66692
foxitpdf_editor
2025.2.0.68868
foxitpdf_reader
𝑥
≤ 2025.2.0.68868
foxitpdf_editor
𝑥
≤ 13.2.0.23874
foxitpdf_editor
2023.1.0.15510 ≤
𝑥
≤ 2023.3.0.23028
foxitpdf_editor
2024.1.0.23997 ≤
𝑥
≤ 2024.4.1.27687
foxitpdf_editor
14.0.0.33046
foxitpdf_editor
2025.1.0.27937
foxitpdf_editor
2025.2.0.33046
foxitpdf_reader
𝑥
≤ 2025.2.0.33046
𝑥
= Vulnerable software versions