CVE-2026-3778
EUVD-2026-1775701.04.2026, 02:16
The application does not detect or guard against cyclic PDF object references while handling JavaScript in PDF. When pages and annotations are crafted that reference each other in a loop, passing the document to APIs (e.g., SOAP) that perform deep traversal can cause uncontrolled recursion, stack exhaustion, and application crashes.Enginsight
Affected Products (NVD)
| Vendor | Product | Version |
|---|---|---|
| foxit | pdf_editor | 𝑥 ≤ 13.2.2.24014 |
| foxit | pdf_editor | 14.0.0.33046 ≤ 𝑥 ≤ 14.0.2.33402 |
| foxit | pdf_editor | 2023.1.0.15510 ≤ 𝑥 ≤ 2023.3.0.23028 |
| foxit | pdf_editor | 2024.1.0.23997 ≤ 𝑥 ≤ 2024.4.1.27687 |
| foxit | pdf_editor | 2025.1.0.27937 ≤ 𝑥 ≤ 2025.3.0.35737 |
| foxit | pdf_reader | 𝑥 ≤ 2025.3.0.35737 |
| foxit | pdf_editor | 𝑥 ≤ 13.2.2.63349 |
| foxit | pdf_editor | 14.0.0.68868 ≤ 𝑥 ≤ 14.0.2.69164 |
| foxit | pdf_editor | 2023.1.0.55583 ≤ 𝑥 ≤ 2023.3.0.63083 |
| foxit | pdf_editor | 2024.1.0.63682 ≤ 𝑥 ≤ 2024.4.1.66479 |
| foxit | pdf_editor | 2025.1.0.66692 ≤ 𝑥 ≤ 2025.3.0.69570 |
| foxit | pdf_reader | 𝑥 ≤ 2025.3.0.69570 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration