CVE-2025-59803

EUVD-2025-202692
Foxit PDF Editor and Reader before 2025.2.1 allow signature spoofing via triggers. An attacker can embed triggers (e.g., JavaScript) in a PDF document that execute during the signing process. When a signer reviews the document, the content appears normal. However, once the signature is applied, the triggers modify content on other pages or optional content layers without explicit warning. This can cause the signed PDF to differ from what the signer saw, undermining the trustworthiness of the digital signature. The fixed versions are 2025.2.1, 14.0.1, and 13.2.1.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
5.3 MEDIUM
NETWORK
HIGH
NONE
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N
CISA-ADPADP
5.3 MEDIUM
NETWORK
HIGH
NONE
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N
Base Score
CVSS 3.x
EPSS Score
Percentile: 5%
Affected Products (NVD)
VendorProductVersion
foxitpdf_editor
𝑥
≤ 13.2.0.63256
foxitpdf_editor
2023.1.0.55583 ≤
𝑥
≤ 2023.3.0.63083
foxitpdf_editor
2024.1.0.63682 ≤
𝑥
≤ 2024.4.1.66479
foxitpdf_editor
14.0.0.68868
foxitpdf_editor
2025.1.0.66692
foxitpdf_editor
2025.2.0.68868
foxitpdf_reader
𝑥
≤ 2025.2.0.68868
foxitpdf_editor
𝑥
≤ 13.2.0.23874
foxitpdf_editor
2023.1.0.15510 ≤
𝑥
≤ 2023.3.0.23028
foxitpdf_editor
2024.1.0.23997 ≤
𝑥
≤ 2024.4.1.27687
foxitpdf_editor
14.0.0.33046
foxitpdf_editor
2025.1.0.27937
foxitpdf_editor
2025.2.0.33046
foxitpdf_reader
𝑥
≤ 2025.2.0.33046
𝑥
= Vulnerable software versions