Impact
Foxit PDF Editor and Reader fail to verify the lifetime of internal view cache pointers after JavaScript alters document zoom and page state. When a script changes the zoom property and triggers a page change, the original view object can be destroyed while stale pointers remain. Dereferencing these freed pointers provides a use‑after‑free condition that an attacker could exploit to run arbitrary code. The weakness is a classic use‑after‑free (CWE‑416), potentially compromising confidentiality, integrity, and availability of the affected host.
Affected Systems
The vulnerability affects Foxit Software Inc.'s Foxit PDF Editor and Foxit PDF Reader products. No specific affected versions are listed in the advisory, so all releases that have not applied a fix are potentially vulnerable.
Risk and Exploitability
The CVSS score of 5.5 indicates moderate severity, while the EPSS score of less than 1% suggests low probability of exploitation in the wild. The vulnerability is not included in CISA's KEV catalog. The likely attack vector is a user opening a malicious PDF containing crafted JavaScript that manipulates zoom and page changes, leading to a use‑after‑free that may allow arbitrary code execution. Consequently, the risk is medium to high for any environment that permits JavaScript execution in PDFs and does not restrict or sandbox such content.
OpenCVE Enrichment