CVE-2025-55310
Foxit · Foxit PDF Reader and Editor on macOS
A high-severity vulnerability, identified as CVE-2025-55310 with a CVSS score of 7.3, has been discovered in Foxit PDF Reader and Editor software running on macOS.
Executive summary
A high-severity vulnerability, identified as CVE-2025-55310 with a CVSS score of 7.3, has been discovered in Foxit PDF Reader and Editor software running on macOS. This flaw could allow an attacker to execute arbitrary code on a victim's system if they open a specially crafted, malicious PDF file. Successful exploitation could lead to a full system compromise, enabling data theft, malware installation, or further network intrusion.
Vulnerability
The vulnerability is a use-after-free condition within the PDF parsing engine of the Foxit software. An attacker can exploit this by creating a malicious PDF document containing specially crafted objects. When a user opens this file, the application improperly handles memory pointers, allowing the attacker to corrupt memory and execute arbitrary code with the privileges of the logged-in user. Exploitation requires user interaction, as the victim must be tricked into opening the malicious file, typically delivered via email phishing campaigns or web downloads.
Business impact
This vulnerability presents a significant risk to the organization, classified as High severity with a CVSS score of 7.3. Successful exploitation could grant an attacker an initial foothold into the corporate network. Potential consequences include the deployment of ransomware, theft of sensitive intellectual property or customer data, financial fraud, and reputational damage. A compromised endpoint could also be used as a pivot point to move laterally across the network, escalating the scope and impact of the breach.
Remediation
Immediate Action: Immediately apply security updates from Foxit to upgrade all instances of Foxit PDF Reader and Editor to version 13 or later on all macOS endpoints. Prioritize patching for systems used by high-risk users, such as executives and finance personnel. Concurrently, monitor endpoint detection and response (EDR) systems for signs of exploitation and review application logs for anomalous behavior originating from the Foxit software process.
Proactive Monitoring: Security teams should configure monitoring rules to detect suspicious activity associated with the Foxit application. This includes looking for the application spawning child processes like shell scripts (sh, bash) or making unusual outbound network connections. Review logs for evidence of unexpected file creation or modification in user directories following the opening of a PDF document.
Compensating Controls: If immediate patching is not feasible, implement the following controls:
- Configure email security gateways to more aggressively scan and block or quarantine PDF attachments from untrusted sources.
- Use application control solutions to prevent the Foxit application from executing child processes.
- Educate users on the dangers of opening unsolicited attachments and provide guidance on identifying potential phishing attempts.
- Temporarily enforce the use of an alternative, unaffected PDF viewing application until patching is complete.
Exploitation status
Public Exploit Available: false
Analyst recommendation
Given the high severity (CVSS 7.3) of this vulnerability and the ease of exploitation through social engineering, we strongly recommend immediate action. The primary and most effective course of action is to deploy the vendor-supplied patches to all affected macOS systems across the enterprise without delay. While there is no current evidence of active exploitation, the risk of future attacks is substantial. Organizations must prioritize patching and enhance monitoring to mitigate the threat of a system compromise that could lead to a significant data breach or operational disruption.