Description
The application does not detect or guard against cyclic PDF object references while handling JavaScript in PDF. When pages and annotations are crafted that reference each other in a loop, passing the document to APIs (e.g., SOAP) that perform deep traversal can cause uncontrolled recursion, stack exhaustion, and application crashes.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
No advisories yet.
References
| Link | Providers |
|---|---|
| https://www.foxit.com/support/security-bulletins.html |
|
History
Wed, 01 Apr 2026 02:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The application does not detect or guard against cyclic PDF object references while handling JavaScript in PDF. When pages and annotations are crafted that reference each other in a loop, passing the document to APIs (e.g., SOAP) that perform deep traversal can cause uncontrolled recursion, stack exhaustion, and application crashes. | |
| Title | Stack exhaustion caused by cyclic references in Foxit PDF Editor/Reader | |
| Weaknesses | CWE-674 | |
| References |
| |
| Metrics |
cvssV3_1
|
Subscriptions
No data.
Status: PUBLISHED
Assigner: Foxit
Published:
Updated: 2026-04-01T01:40:31.681Z
Reserved: 2026-03-08T03:43:26.764Z
Link: CVE-2026-3778
No data.
Status : Received
Published: 2026-04-01T02:16:02.897
Modified: 2026-04-01T02:16:02.897
Link: CVE-2026-3778
No data.
OpenCVE Enrichment
No data.
Weaknesses