Description
The application allows PDF JavaScript and document/print actions (such as WillPrint/DidPrint) to update form fields, annotations, or optional content groups (OCGs) immediately before or after redaction, encryption, or printing. These script‑driven updates are not fully covered by the existing redaction, encryption, and printing logic, which, under specific document structures and user workflows, may cause a small amount of sensitive content to remain unremoved or unencrypted as expected, or result in printed output that slightly differs from what was reviewed on screen.
Published: 2026-04-01
Score: 4.7 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Information Disclosure
Action: Patch
AI Analysis

Impact

The flaw allows PDF JavaScript and document‑oriented actions—for example, WillPrint or DidPrint—to alter form fields, annotations, or optional content groups just before or after redaction, encryption, or printing. Because these script‑driven updates bypass the existing redaction, encryption, and printing checks, a crafted PDF can leave a fragment of sensitive information unredacted or unencrypted, or produce a printed output that does not match the on‑screen version. The vulnerability is therefore a source of potential data exposure and log integrity issues.

Affected Systems

Foxit Software’s PDF Editor is the primary consumer of the affected logic, and since the redaction and printing features apply to any PDF file opened in the editor, any workstation running Foxit PDF Editor on Windows could be impacted. No specific software version was identified in the advisory, so all installations prior to an unpublicized update may be vulnerable.

Risk and Exploitability

The CVSS score of 4.7 indicates moderate severity, and the EPSS score of less than 1 % suggests a low likelihood of widespread exploitation. The vulnerability is not listed in the CISA KEV catalogue. Exploitation requires a user to open a malicious PDF that contains JavaScript designed to execute at print or redact time, a scenario that is plausible if users receive untrusted documents. The attack surface is therefore limited to environments where PDF JavaScript is enabled and users routinely open and print PDFs.

Generated by OpenCVE AI on April 10, 2026 at 02:26 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Install the latest Foxit PDF Editor update that resolves the script‑driven modification issue.
  • If an update is not yet available, configure the editor to disable JavaScript execution (Settings → Security → Restrict JavaScript).
  • Manually inspect or use a secondary viewer that fully enforces redaction and encryption before printing.
  • Cross‑check printed documents against the on‑screen content to detect any discrepancies.

Generated by OpenCVE AI on April 10, 2026 at 02:26 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 10 Apr 2026 01:45:00 +0000

Type Values Removed Values Added
First Time appeared Foxit
Foxit pdf Editor
Foxit pdf Reader
Microsoft
Microsoft windows
Weaknesses NVD-CWE-noinfo
CPEs cpe:2.3:a:foxit:pdf_editor:*:*:*:*:*:*:*:*
cpe:2.3:a:foxit:pdf_reader:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*
Vendors & Products Foxit
Foxit pdf Editor
Foxit pdf Reader
Microsoft
Microsoft windows

Thu, 02 Apr 2026 20:30:00 +0000

Type Values Removed Values Added
First Time appeared Foxitsoftware
Foxitsoftware foxit Pdf Editor
Vendors & Products Foxitsoftware
Foxitsoftware foxit Pdf Editor

Wed, 01 Apr 2026 23:45:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 01 Apr 2026 02:15:00 +0000

Type Values Removed Values Added
Description The application allows PDF JavaScript and document/print actions (such as WillPrint/DidPrint) to update form fields, annotations, or optional content groups (OCGs) immediately before or after redaction, encryption, or printing. These script‑driven updates are not fully covered by the existing redaction, encryption, and printing logic, which, under specific document structures and user workflows, may cause a small amount of sensitive content to remain unremoved or unencrypted as expected, or result in printed output that slightly differs from what was reviewed on screen.
Title Self-Modifications Affecting Altered Printing and Redaction in Foxit PDF Editor
Weaknesses CWE-200
References
Metrics cvssV3_1

{'score': 4.7, 'vector': 'CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N'}


Subscriptions

Foxit Pdf Editor Pdf Reader
Foxitsoftware Foxit Pdf Editor
Microsoft Windows
cve-icon MITRE

Status: PUBLISHED

Assigner: Foxit

Published:

Updated: 2026-04-02T02:11:11.364Z

Reserved: 2026-03-08T03:42:24.474Z

Link: CVE-2026-3774

cve-icon Vulnrichment

Updated: 2026-04-01T14:15:22.964Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-01T02:16:02.287

Modified: 2026-04-10T01:36:58.587

Link: CVE-2026-3774

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-10T09:45:52Z

Weaknesses