Description
The application's update service, when checking for updates, loads certain system libraries from a search path that includes directories writable by low‑privileged users and is not strictly restricted to trusted system locations. Because these libraries may be resolved and loaded from user‑writable locations, a local attacker can place a malicious library there and have it loaded with SYSTEM privileges, resulting in local privilege escalation and arbitrary code execution.
Published: 2026-04-01
Score: 7.8 High
EPSS: < 1% Very Low
KEV: No
Impact: Local Privilege Escalation
Action: Patch Promptly
AI Analysis

Impact

The vulnerability permits a local attacker to exploit the update service’s use of an uncontrolled search path, allowing a malicious DLL to be loaded with SYSTEM privileges and thus achieving arbitrary code execution, identified as CWE‑427.

Affected Systems

Foxit Software Inc.’s PDF Editor and PDF Reader applications on Windows are affected; the specific edition or version is not listed, so any installation that uses the default update service is potentially vulnerable.

Risk and Exploitability

The CVSS score of 7.8 and an EPSS below 1 % indicate high severity but low current exploitation likelihood; the flaw is not listed in the CISA KEV catalog, and exploitation requires local write access to the vulnerable directories and triggering an update check.

Generated by OpenCVE AI on April 14, 2026 at 21:48 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest Foxit update that removes writable directories from the update service’s search path.
  • If no update is available, disable the update service or block its network access to prevent update checks from loading libraries.
  • Restrict write permissions on directories referenced by the update service’s search path so that non‑privileged users cannot add files.
  • Monitor those directories for unexpected DLLs or permission changes.

Generated by OpenCVE AI on April 14, 2026 at 21:48 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 14 Apr 2026 18:00:00 +0000

Type Values Removed Values Added
First Time appeared Foxit
Foxit pdf Editor
Foxit pdf Reader
Microsoft
Microsoft windows
CPEs cpe:2.3:a:foxit:pdf_editor:*:*:*:*:*:*:*:*
cpe:2.3:a:foxit:pdf_reader:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*
Vendors & Products Foxit
Foxit pdf Editor
Foxit pdf Reader
Microsoft
Microsoft windows

Fri, 03 Apr 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Foxitsoftware
Foxitsoftware foxit Pdf Editor
Foxitsoftware foxit Reader
Vendors & Products Foxitsoftware
Foxitsoftware foxit Pdf Editor
Foxitsoftware foxit Reader

Wed, 01 Apr 2026 23:45:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 01 Apr 2026 02:15:00 +0000

Type Values Removed Values Added
Description The application's update service, when checking for updates, loads certain system libraries from a search path that includes directories writable by low‑privileged users and is not strictly restricted to trusted system locations. Because these libraries may be resolved and loaded from user‑writable locations, a local attacker can place a malicious library there and have it loaded with SYSTEM privileges, resulting in local privilege escalation and arbitrary code execution.
Title Foxit PDF Editor/Reader Update Service Uncontrolled Search Path Element Local Privilege Escalation Vulnerability
Weaknesses CWE-427
References
Metrics cvssV3_1

{'score': 7.8, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}


Subscriptions

Foxit Pdf Editor Pdf Reader
Foxitsoftware Foxit Pdf Editor Foxit Reader
Microsoft Windows
cve-icon MITRE

Status: PUBLISHED

Assigner: Foxit

Published:

Updated: 2026-04-02T02:11:52.749Z

Reserved: 2026-03-08T03:42:27.208Z

Link: CVE-2026-3775

cve-icon Vulnrichment

Updated: 2026-04-01T14:16:42.873Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-01T02:16:02.440

Modified: 2026-04-14T17:56:31.173

Link: CVE-2026-3775

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-15T16:45:09Z

Weaknesses