Foxit PDF Editor and Reader before 2025.2.1 allow signature spoofing via triggers. An attacker can embed triggers (e.g., JavaScript) in a PDF document that execute during the signing process. When a signer reviews the document, the content appears normal. However, once the signature is applied, the triggers modify content on other pages or optional content layers without explicit warning. This can cause the signed PDF to differ from what the signer saw, undermining the trustworthiness of the digital signature. The fixed versions are 2025.2.1, 14.0.1, and 13.2.1.
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Tue, 16 Dec 2025 05:30:00 +0900

Type Values Removed Values Added
First Time appeared Apple
Apple macos
Microsoft
Microsoft windows
CPEs cpe:2.3:a:foxit:pdf_editor:*:*:*:*:*:*:*:*
cpe:2.3:a:foxit:pdf_editor:14.0.0.33046:*:*:*:*:*:*:*
cpe:2.3:a:foxit:pdf_editor:14.0.0.68868:*:*:*:*:*:*:*
cpe:2.3:a:foxit:pdf_editor:2025.1.0.27937:*:*:*:*:*:*:*
cpe:2.3:a:foxit:pdf_editor:2025.1.0.66692:*:*:*:*:*:*:*
cpe:2.3:a:foxit:pdf_editor:2025.2.0.33046:*:*:*:*:*:*:*
cpe:2.3:a:foxit:pdf_editor:2025.2.0.68868:*:*:*:*:*:*:*
cpe:2.3:a:foxit:pdf_reader:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*
Vendors & Products Apple
Apple macos
Microsoft
Microsoft windows

Fri, 12 Dec 2025 06:45:00 +0900

Type Values Removed Values Added
First Time appeared Foxit
Foxit pdf Editor
Foxit pdf Reader
Vendors & Products Foxit
Foxit pdf Editor
Foxit pdf Reader

Fri, 12 Dec 2025 01:15:00 +0900

Type Values Removed Values Added
Weaknesses CWE-347
Metrics cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 12 Dec 2025 00:45:00 +0900

Type Values Removed Values Added
Description Foxit PDF Editor and Reader before 2025.2.1 allow signature spoofing via triggers. An attacker can embed triggers (e.g., JavaScript) in a PDF document that execute during the signing process. When a signer reviews the document, the content appears normal. However, once the signature is applied, the triggers modify content on other pages or optional content layers without explicit warning. This can cause the signed PDF to differ from what the signer saw, undermining the trustworthiness of the digital signature. The fixed versions are 2025.2.1, 14.0.1, and 13.2.1.
References

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2025-12-11T15:45:25.425Z

Reserved: 2025-09-22T00:00:00.000Z

Link: CVE-2025-59803

cve-icon Vulnrichment

Updated: 2025-12-11T15:44:48.872Z

cve-icon NVD

Status : Analyzed

Published: 2025-12-11T16:16:27.013

Modified: 2025-12-15T20:17:46.830

Link: CVE-2025-59803

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2025-12-12T06:37:30Z

Weaknesses