Description
Addressed a potential insecure direct object reference (IDOR) vulnerability in the signing invitation acceptance process. Under certain conditions, this issue could have allowed an attacker to access or modify unauthorized resources by manipulating user-supplied object identifiers, potentially leading to forged signatures and compromising the integrity and authenticity of documents undergoing the signing process. The issue was caused by insufficient authorization validation on referenced resources during request processing.
Published: 2026-04-01
Score: 7.1 High
EPSS: < 1% Very Low
KEV: No
Impact: Signature Forgery / Integrity Compromise
Action: Immediate Patch
AI Analysis

Impact

The vulnerability is an insecure direct object reference that permits an attacker to manipulate object identifiers during the signing invitation acceptance process. This allows unauthorized access or modification of resources, potentially resulting in forged signatures and compromising the integrity and authenticity of documents. The weakness falls under access control failure (CWE-284).

Affected Systems

Affected systems include Foxit eSign (platform foxitesign.foxit.com) as listed by the CNA. No explicit version information is provided, so all instances of the platform that process signing invitations may be susceptible until a patch is applied.

Risk and Exploitability

The CVSS score of 7.1 indicates moderate to high severity, while the EPSS score of less than 1% suggests a low probability of exploitation at this time. The vulnerability is not currently catalogued in the CISA KEV list. Likely attack vectors involve remote web requests where attackers manipulate resource identifiers; the vulnerability can be leveraged without additional prerequisites beyond sending a crafted request. Mitigation requires applying the vendor’s patch or upgrade, enforcing proper authorization checks on all referenced resources, and monitoring for suspicious activity to prevent forged signatures.

Generated by OpenCVE AI on April 2, 2026 at 04:46 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the official patch or upgrade to the latest Foxit eSign version as detailed in the security bulletin at https://www.foxit.com/support/security-bulletins.html
  • Verify that all signing invitation requests enforce strict authorization checks on referenced resources to prevent direct object reference
  • Review and tighten user access controls for signing invitation generation and acceptance processes
  • Monitor application logs for anomalous object identifier usage and unauthorized access attempts
  • Validate signatures and ensure that signature verification processes are enabled to detect any tampering

Generated by OpenCVE AI on April 2, 2026 at 04:46 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 02 Apr 2026 20:30:00 +0000

Type Values Removed Values Added
First Time appeared Foxitsoftware
Foxitsoftware na1.foxitesign.foxit.com
Vendors & Products Foxitsoftware
Foxitsoftware na1.foxitesign.foxit.com

Wed, 01 Apr 2026 23:45:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 01 Apr 2026 02:15:00 +0000

Type Values Removed Values Added
Description Addressed a potential insecure direct object reference (IDOR) vulnerability in the signing invitation acceptance process. Under certain conditions, this issue could have allowed an attacker to access or modify unauthorized resources by manipulating user-supplied object identifiers, potentially leading to forged signatures and compromising the integrity and authenticity of documents undergoing the signing process. The issue was caused by insufficient authorization validation on referenced resources during request processing.
Title Insecure Direct Object Reference (IDOR) Leading to Signature Forgery in Foxit eSign
Weaknesses CWE-284
References
Metrics cvssV3_1

{'score': 7.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N'}


Subscriptions

Foxitsoftware Na1.foxitesign.foxit.com
cve-icon MITRE

Status: PUBLISHED

Assigner: Foxit

Published:

Updated: 2026-04-02T02:15:11.035Z

Reserved: 2026-03-27T03:21:37.486Z

Link: CVE-2026-4947

cve-icon Vulnrichment

Updated: 2026-04-01T14:19:20.997Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-04-01T02:16:03.740

Modified: 2026-04-01T14:23:37.727

Link: CVE-2026-4947

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-02T20:18:33Z

Weaknesses