Description
The application does not properly validate the lifetime and validity of internal view cache pointers after JavaScript changes the document zoom and page state. When a script modifies the zoom property and then triggers a page change, the original view object may be destroyed while stale pointers are still kept and later dereferenced, which under crafted JavaScript and document structures can lead to a use-after-free condition and potentially allow arbitrary code execution.
Published: 2026-04-01
Score: 5.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Arbitrary code execution via use‑after‑free
Action: Immediate Patch
AI Analysis

Impact

Foxit PDF Editor and Reader fail to verify the lifetime of internal view cache pointers after JavaScript alters document zoom and page state. When a script changes the zoom property and triggers a page change, the original view object can be destroyed while stale pointers remain. Dereferencing these freed pointers provides a use‑after‑free condition that an attacker could exploit to run arbitrary code. The weakness is a classic use‑after‑free (CWE‑416), potentially compromising confidentiality, integrity, and availability of the affected host.

Affected Systems

The vulnerability affects Foxit Software Inc.'s Foxit PDF Editor and Foxit PDF Reader products. No specific affected versions are listed in the advisory, so all releases that have not applied a fix are potentially vulnerable.

Risk and Exploitability

The CVSS score of 5.5 indicates moderate severity, while the EPSS score of less than 1% suggests low probability of exploitation in the wild. The vulnerability is not included in CISA's KEV catalog. The likely attack vector is a user opening a malicious PDF containing crafted JavaScript that manipulates zoom and page changes, leading to a use‑after‑free that may allow arbitrary code execution. Consequently, the risk is medium to high for any environment that permits JavaScript execution in PDFs and does not restrict or sandbox such content.

Generated by OpenCVE AI on April 14, 2026 at 21:07 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest patch or update to a newer version of Foxit PDF Editor or Reader that addresses the use‑after‑free issue. If a patch is not yet available, disable JavaScript processing for PDF documents via the application’s security settings. Consider using an alternative PDF viewer that does not enable JavaScript or that has mitigations for use‑after‑free vulnerabilities.

Generated by OpenCVE AI on April 14, 2026 at 21:07 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 14 Apr 2026 18:00:00 +0000

Type Values Removed Values Added
First Time appeared Apple
Apple macos
Foxit
Foxit pdf Editor
Foxit pdf Reader
Microsoft
Microsoft windows
CPEs cpe:2.3:a:foxit:pdf_editor:*:*:*:*:*:*:*:*
cpe:2.3:a:foxit:pdf_reader:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*
Vendors & Products Apple
Apple macos
Foxit
Foxit pdf Editor
Foxit pdf Reader
Microsoft
Microsoft windows

Fri, 03 Apr 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Foxitsoftware
Foxitsoftware foxit Pdf Editor
Foxitsoftware foxit Reader
Vendors & Products Foxitsoftware
Foxitsoftware foxit Pdf Editor
Foxitsoftware foxit Reader

Wed, 01 Apr 2026 23:45:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 01 Apr 2026 02:15:00 +0000

Type Values Removed Values Added
Description The application does not properly validate the lifetime and validity of internal view cache pointers after JavaScript changes the document zoom and page state. When a script modifies the zoom property and then triggers a page change, the original view object may be destroyed while stale pointers are still kept and later dereferenced, which under crafted JavaScript and document structures can lead to a use-after-free condition and potentially allow arbitrary code execution.
Title Use after free of view cache in Foxit PDF Editor/Reader
Weaknesses CWE-416
References
Metrics cvssV3_1

{'score': 5.5, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}


Subscriptions

Apple Macos
Foxit Pdf Editor Pdf Reader
Foxitsoftware Foxit Pdf Editor Foxit Reader
Microsoft Windows
cve-icon MITRE

Status: PUBLISHED

Assigner: Foxit

Published:

Updated: 2026-04-02T02:12:55.076Z

Reserved: 2026-03-08T03:43:24.941Z

Link: CVE-2026-3777

cve-icon Vulnrichment

Updated: 2026-04-01T14:19:06.703Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-01T02:16:02.737

Modified: 2026-04-14T17:54:52.200

Link: CVE-2026-3777

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-15T16:45:09Z

Weaknesses