Description
Foxit PDF Editor Cloud (pdfonline) contains a stored cross-site scripting vulnerability in the Create New Layer feature. Unsanitized user input is embedded into the HTML output, allowing arbitrary JavaScript execution when the layer is referenced.

This issue affects pdfonline.foxit.com: before 2026‑02‑03.
Published: 2026-02-03
Score: 6.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Stored Cross‑Site Scripting
Action: Patch
AI Analysis

Impact

Foxit PDF Editor Cloud allows a user to create a new layer with unsanitized input that is stored and later rendered as part of the document’s HTML. When an unsuspecting user opens a document containing the malicious layer, the script executes in their browser, providing the attacker with the ability to run arbitrary JavaScript, steal session cookies, or perform further actions in the user’s context. This stored cross‑site scripting flaw is a classic input validation weakness (CWE‑79).

Affected Systems

The vulnerability exists in Foxit Software Inc.’s PDF Editor Cloud service (pdfonline) for all releases prior to 2026‑02‑03. No later versions are impacted.

Risk and Exploitability

With a CVSS base score of 6.3 and an EPSS below 1 %, the likelihood of exploitation in the wild is low, and the flaw is not listed in CISA's Known Exploited Vulnerabilities catalog. The flaw is typically triggered when a user creates a malicious layer that is later viewed by an attacker or other users, so the attack vector is via the web interface of the service. Although its impact is limited to the victim’s browser session, successful exploitation could lead to credential theft, data exfiltration, or defacement of shared documents.

Generated by OpenCVE AI on April 18, 2026 at 00:23 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update to a version released after 2026‑02‑03 or apply any vendor patch that addresses the stored XSS in the Create New Layer feature.
  • If updating is not immediately possible, disable or restrict the ability for users to create new layers that contain unsanitized input, or enforce stricter input validation by configuring the service or a web application firewall to block malicious scripts.
  • Deploy a Content Security Policy that limits script execution within PDF Editor Cloud pages, reducing the damage if an XSS payload is somehow injected.

Generated by OpenCVE AI on April 18, 2026 at 00:23 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 18 Feb 2026 16:15:00 +0000

Type Values Removed Values Added
First Time appeared Foxit
Foxit pdf Editor Cloud
CPEs cpe:2.3:a:foxit:pdf_editor_cloud:*:*:*:*:*:*:*:*
Vendors & Products Foxit
Foxit pdf Editor Cloud

Wed, 04 Feb 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 04 Feb 2026 12:15:00 +0000

Type Values Removed Values Added
First Time appeared Foxitsoftware
Foxitsoftware pdfonline
Vendors & Products Foxitsoftware
Foxitsoftware pdfonline

Tue, 03 Feb 2026 13:15:00 +0000

Type Values Removed Values Added
Description Foxit PDF Editor Cloud (pdfonline) contains a stored cross-site scripting vulnerability in the Create New Layer feature. Unsanitized user input is embedded into the HTML output, allowing arbitrary JavaScript execution when the layer is referenced. This issue affects pdfonline.foxit.com: before 2026‑02‑03.
Title Stored XSS via Create New Layer Field found in Foxit PDF Editor Cloud
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 6.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:L/A:N'}


Subscriptions

Foxit Pdf Editor Cloud
Foxitsoftware Pdfonline
cve-icon MITRE

Status: PUBLISHED

Assigner: Foxit

Published:

Updated: 2026-02-04T16:09:38.510Z

Reserved: 2026-01-29T07:31:16.225Z

Link: CVE-2026-1592

cve-icon Vulnrichment

Updated: 2026-02-04T16:09:35.585Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-03T08:16:15.043

Modified: 2026-02-18T16:08:28.207

Link: CVE-2026-1592

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T00:30:25Z

Weaknesses