Description
Foxit PDF Editor Cloud (pdfonline) contains a stored cross-site scripting vulnerability in the file upload feature. A malicious username is embedded into the upload file list without proper escaping, allowing arbitrary JavaScript execution when the list is displayed.

This issue affects pdfonline.foxit.com: before 2026‑02‑03.
Published: 2026-02-03
Score: 6.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Stored Cross‑Site Scripting that can lead to arbitrary JavaScript execution in users' browsers.
Action: Patch
AI Analysis

Impact

Foxit PDF Editor Cloud, accessed via pdfonline.foxit.com, contains a stored cross‑site scripting vulnerability in the file upload feature. Malicious usernames are embedded into the list of uploaded files without proper HTML escaping, allowing an attacker to inject and execute arbitrary JavaScript whenever the file list is viewed. This can compromise user accounts, exfiltrate session data, or execute further malicious actions in the context of the victim’s browser. The weakness corresponds to CWE‑79.

Affected Systems

The affected product is Foxit PDF Editor Cloud (pdfonline.foxit.com) running any version prior to the update released on February 3, 2026. Foxit Software Inc. is the vendor responsible for the service.

Risk and Exploitability

The vulnerability has a CVSS base score of 6.3, indicating moderate severity, and an EPSS score of less than 1 %, suggesting low probability of exploitation in the wild at this time. It is not listed in CISA’s Known Exploited Vulnerabilities catalog, further indicating it has not yet been widely abused. To exploit, an attacker needs to upload a file with a crafted username and then compel a user to view the upload list, which is a typical, user‑interaction dependent vector. The stored nature of the flaw means the malicious payload remains in the system until the vendor issues a fix.

Generated by OpenCVE AI on April 18, 2026 at 00:23 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update to the latest version of Foxit PDF Editor Cloud released on or after February 3, 2026, which fixes the stored XSS vulnerability.
  • If an immediate upgrade is not possible, disable the file upload feature or enforce strict input validation to escape or reject characters that could form script tags in the username field.
  • As an interim guard, configure the application server’s content security policy to disallow inline scripts on the file list page, preventing execution of any injected code until a patch is applied.

Generated by OpenCVE AI on April 18, 2026 at 00:23 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 18 Feb 2026 16:15:00 +0000

Type Values Removed Values Added
First Time appeared Foxit
Foxit pdf Editor Cloud
CPEs cpe:2.3:a:foxit:pdf_editor_cloud:*:*:*:*:*:*:*:*
Vendors & Products Foxit
Foxit pdf Editor Cloud

Wed, 04 Feb 2026 12:15:00 +0000

Type Values Removed Values Added
First Time appeared Foxitsoftware
Foxitsoftware pdfonline
Vendors & Products Foxitsoftware
Foxitsoftware pdfonline

Tue, 03 Feb 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 03 Feb 2026 13:15:00 +0000

Type Values Removed Values Added
Description Foxit PDF Editor Cloud (pdfonline) contains a stored cross-site scripting vulnerability in the file upload feature. A malicious username is embedded into the upload file list without proper escaping, allowing arbitrary JavaScript execution when the list is displayed. This issue affects pdfonline.foxit.com: before 2026‑02‑03.
Title Stored XSS via Attachments Feature in https://pdfonline.foxit.com/
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 6.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:L/A:N'}


Subscriptions

Foxit Pdf Editor Cloud
Foxitsoftware Pdfonline
cve-icon MITRE

Status: PUBLISHED

Assigner: Foxit

Published:

Updated: 2026-02-03T18:47:39.727Z

Reserved: 2026-01-29T07:31:14.294Z

Link: CVE-2026-1591

cve-icon Vulnrichment

Updated: 2026-02-03T18:47:22.168Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-03T08:16:14.900

Modified: 2026-02-18T16:08:22.517

Link: CVE-2026-1591

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T00:30:25Z

Weaknesses