A stored cross-site scripting (XSS) vulnerability exists in pdfonline.foxit.com within the Predefined Text feature of the Foxit eSign section. A crafted payload can be stored via the Identity “First Name” field, which is later rendered into the DOM without proper sanitization. As a result, the injected script may execute when predefined text is used or when viewing document properties.
Metrics
Affected Vendors & Products
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
| Link | Providers |
|---|---|
| https://www.foxit.com/support/security-bulletins.html |
|
History
Fri, 19 Dec 2025 07:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A stored cross-site scripting (XSS) vulnerability exists in pdfonline.foxit.com within the Predefined Text feature of the Foxit eSign section. A crafted payload can be stored via the Identity “First Name” field, which is later rendered into the DOM without proper sanitization. As a result, the injected script may execute when predefined text is used or when viewing document properties. | |
| Title | Foxit pdfonline.foxit.com Stored Cross-Site Scripting in eSign Predefined Text Feature | |
| Weaknesses | CWE-79 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: Foxit
Published:
Updated: 2025-12-19T09:27:24.786Z
Reserved: 2025-12-03T01:33:55.298Z
Link: CVE-2025-66501
No data.
Status : Received
Published: 2025-12-19T08:15:53.583
Modified: 2025-12-19T08:15:53.583
Link: CVE-2025-66501
No data.
OpenCVE Enrichment
No data.
Weaknesses