Description
The application does not detect or guard against cyclic PDF object references while handling JavaScript in PDF. When pages and annotations are crafted that reference each other in a loop, passing the document to APIs (e.g., SOAP) that perform deep traversal can cause uncontrolled recursion, stack exhaustion, and application crashes.
Published: 2026-04-01
Score: 6.2 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Denial of Service
Action: Patch
AI Analysis

Impact

The vulnerability arises from the application’s lack of checks for cyclic references within PDF objects that are processed by JavaScript. When a crafted PDF contains pages and annotations that reference each other in a loop, the deep traversal performed by APIs such as SOAP can trigger uncontrolled recursion, eventually exhausting the process stack and causing the application to crash. This effect manifests as a denial of service to the user and is classified as CWE‑674, Uncontrolled Recursion.

Affected Systems

Both Foxit PDF Editor and Foxit PDF Reader from Foxit Software Inc. are affected. The vulnerability is potentially present in all current releases of these applications running on supported operating systems, including Apple macOS and Microsoft Windows. No specific version range is listed, so any installation of the PDF Editor or Reader should be treated as at risk until an update is applied.

Risk and Exploitability

The CVSS base score of 6.2 indicates moderate severity, while the EPSS score of less than 1% suggests a low probability of widespread exploitation. The vulnerability is not listed in the CISA KEV catalog, further indicating limited evidence of active exploitation. The likely attack vector is a malicious PDF file delivered to the user; opening the file would trigger the stack exhaustion. Because the impact is limited to application crash and does not provide privilege escalation or data exfiltration, the exploitability is confined to denial‑of‑service scenarios.

Generated by OpenCVE AI on April 14, 2026 at 21:07 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest vendor patch for Foxit PDF Editor and Foxit PDF Reader
  • Verify that the patch is applied on all systems using the software
  • Monitor Foxit security bulletins for further updates

Generated by OpenCVE AI on April 14, 2026 at 21:07 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 14 Apr 2026 18:00:00 +0000

Type Values Removed Values Added
First Time appeared Apple
Apple macos
Foxit
Foxit pdf Editor
Foxit pdf Reader
Microsoft
Microsoft windows
CPEs cpe:2.3:a:foxit:pdf_editor:*:*:*:*:*:*:*:*
cpe:2.3:a:foxit:pdf_reader:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*
Vendors & Products Apple
Apple macos
Foxit
Foxit pdf Editor
Foxit pdf Reader
Microsoft
Microsoft windows

Fri, 03 Apr 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Foxitsoftware
Foxitsoftware foxit Pdf Editor
Foxitsoftware foxit Reader
Vendors & Products Foxitsoftware
Foxitsoftware foxit Pdf Editor
Foxitsoftware foxit Reader

Wed, 01 Apr 2026 23:45:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 01 Apr 2026 02:15:00 +0000

Type Values Removed Values Added
Description The application does not detect or guard against cyclic PDF object references while handling JavaScript in PDF. When pages and annotations are crafted that reference each other in a loop, passing the document to APIs (e.g., SOAP) that perform deep traversal can cause uncontrolled recursion, stack exhaustion, and application crashes.
Title Stack exhaustion caused by cyclic references in Foxit PDF Editor/Reader
Weaknesses CWE-674
References
Metrics cvssV3_1

{'score': 6.2, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}


Subscriptions

Apple Macos
Foxit Pdf Editor Pdf Reader
Foxitsoftware Foxit Pdf Editor Foxit Reader
Microsoft Windows
cve-icon MITRE

Status: PUBLISHED

Assigner: Foxit

Published:

Updated: 2026-04-02T02:13:28.588Z

Reserved: 2026-03-08T03:43:26.764Z

Link: CVE-2026-3778

cve-icon Vulnrichment

Updated: 2026-04-01T14:18:12.054Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-01T02:16:02.897

Modified: 2026-04-14T17:50:53.873

Link: CVE-2026-3778

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-15T16:45:09Z

Weaknesses