HomeFoxitCVE-2025-59803

CVE-2025-59803

MEDIUM
5.3CVSS
Published: 2025-12-11
Updated: 2025-12-15
AI Analysis

Description

Foxit PDF Editor and Reader before 2025.2.1 allow signature spoofing via triggers. An attacker can embed triggers (e.g., JavaScript) in a PDF document that execute during the signing process. When a signer reviews the document, the content appears normal. However, once the signature is applied, the triggers modify content on other pages or optional content layers without explicit warning. This can cause the signed PDF to differ from what the signer saw, undermining the trustworthiness of the digital signature. The fixed versions are 2025.2.1, 14.0.1, and 13.2.1.

CVSS Metrics

Vector
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N
Attack Vector
network
Complexity
high
Privileges
none
User Action
required
Scope
unchanged
Confidentiality
none
Integrity
high
Availability
none
Weaknesses
CWE-347

Metadata

Primary Vendor
FOXIT
Published
12/11/2025
Last Modified
12/15/2025
Source
NIST NVD
Note: Verify all details with official vendor sources before applying patches.

Affected Products

foxit : pdf_editorfoxit : pdf_editorfoxit : pdf_editorfoxit : pdf_editorfoxit : pdf_editorfoxit : pdf_editorfoxit : pdf_readerfoxit : pdf_editorfoxit : pdf_editorfoxit : pdf_editorfoxit : pdf_editorfoxit : pdf_editorfoxit : pdf_editorfoxit : pdf_reader

AI-Powered Remediation

Generate remediation guidance or a C-suite brief for this vulnerability.

Executive Intelligence Brief

CVE-CVE-2025-59803 | MEDIUM Severity | CVEDatabase.com | CVEDatabase.com