CVE-2025-55312

Windows · Windows Multiple Products

A high-severity vulnerability, identified as CVE-2025-55312 with a CVSS score of 7.8, has been discovered in Foxit PDF Reader and Editor running on the Windows platform.

Executive summary

A high-severity vulnerability, identified as CVE-2025-55312 with a CVSS score of 7.8, has been discovered in Foxit PDF Reader and Editor running on the Windows platform. This flaw could allow an attacker to execute arbitrary code on a victim's system if they open a specially crafted PDF document. Successful exploitation could lead to a full system compromise, data theft, or malware installation.

Vulnerability

This vulnerability resides within the parsing engine of Foxit PDF Reader and Editor. An attacker can create a malicious PDF file containing malformed objects or embedded scripts. When a user opens this malicious file with a vulnerable version of the software, a memory corruption error (such as a buffer overflow or use-after-free) is triggered, allowing the attacker to execute arbitrary code on the target system with the same privileges as the logged-in user. Exploitation is user-driven and typically occurs via phishing emails with malicious PDF attachments or links to hostile websites hosting the malicious file.

Business impact

The vulnerability poses a significant risk to the organization, categorized as High severity with a CVSS score of 7.8. Since PDF documents are a standard and trusted medium for business communication, employees are highly likely to interact with a malicious file. Successful exploitation could result in the installation of malware such as ransomware or spyware, theft of sensitive corporate or personal data, and the attacker gaining an initial foothold for lateral movement within the corporate network. This could lead to financial loss, reputational damage, and operational disruption.

Remediation

Immediate Action: The primary remediation is to apply vendor-supplied security updates across all affected systems immediately. Administrators should identify all installations of Foxit PDF Reader and Editor and upgrade them to version 13.0 or later. Following patching, security teams should monitor endpoint detection and response (EDR) systems for any signs of exploitation attempts and review access logs for unusual activity originating from PDF reader processes.

Proactive Monitoring: Security teams should configure monitoring tools to look for suspicious behavior associated with Foxit software processes (e.g., FoxitPDFReader.exe, FoxitPDFEditor.exe). Key indicators of compromise (IOCs) to monitor include these processes spawning unexpected child processes (like cmd.exe or powershell.exe), making unusual outbound network connections, or attempting to write files to sensitive system directories.

Compensating Controls: If immediate patching is not feasible, organizations can implement compensating controls to reduce risk. These include:

  • Enabling Protected View or Safe Reading Mode within the Foxit application settings to limit the software's ability to interact with the underlying operating system.
  • Using email gateway and web filtering solutions to scan for and block malicious PDF files.
  • Conducting user awareness training to educate employees on the dangers of opening attachments or clicking links from untrusted sources.

Exploitation status

Public Exploit Available: false

Analyst recommendation

Given the high-severity rating (CVSS 7.8) and the ubiquitous nature of PDF software in enterprise environments, this vulnerability presents a critical risk. We strongly recommend that organizations prioritize the immediate deployment of the security update provided by Foxit. Although there is no current evidence of active exploitation, threat actors are known to rapidly develop exploits for such vulnerabilities. Organizations should treat this as an urgent patching requirement to prevent potential future compromise.