HomeFoxitCVE-2025-59802

CVE-2025-59802

HIGH
7.5CVSS
Published: 2025-12-11
Updated: 2025-12-18
AI Analysis

Description

Foxit PDF Editor and Reader before 2025.2.1 allow signature spoofing via OCG. When Optional Content Groups (OCG) are supported, the state property of an OCG is runtime-only and not included in the digital signature computation buffer. An attacker can leverage JavaScript or PDF triggers to dynamically change the visibility of OCG content after signing (Post-Sign), allowing the visual content of a signed PDF to be modified without invalidating the signature. This may result in a mismatch between the signed content and what the signer or verifier sees, undermining the trustworthiness of the digital signature. The fixed versions are 2025.2.1, 14.0.1, and 13.2.1.

CVSS Metrics

Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
Attack Vector
network
Complexity
low
Privileges
none
User Action
none
Scope
unchanged
Confidentiality
none
Integrity
high
Availability
none
Weaknesses
CWE-290

Metadata

Primary Vendor
FOXIT
Published
12/11/2025
Last Modified
12/18/2025
Source
NIST NVD
Note: Verify all details with official vendor sources before applying patches.

Affected Products

foxit : pdf_editorfoxit : pdf_editorfoxit : pdf_editorfoxit : pdf_editorfoxit : pdf_editorfoxit : pdf_editorfoxit : pdf_readerfoxit : pdf_editorfoxit : pdf_editorfoxit : pdf_editorfoxit : pdf_editorfoxit : pdf_editorfoxit : pdf_editorfoxit : pdf_reader

AI-Powered Remediation

Generate remediation guidance or a C-suite brief for this vulnerability.

Executive Intelligence Brief

CVE-CVE-2025-59802 | HIGH Severity | CVEDatabase.com | CVEDatabase.com