An issue was discovered in Foxit PDF and Editor for Windows before 13.2 and 2025 before 2025.2. Opening a malicious PDF containing a crafted JavaScript call to search.query() with a crafted cDIPath parameter (e.g., "/") may cause an out-of-bounds read in internal path-parsing logic, potentially leading to information disclosure or memory corruption.
References
| Link | Resource |
|---|---|
| https://www.foxit.com/support/security-bulletins.html |
Configurations
No configuration.
History
11 Dec 2025, 21:15
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 3.3 |
| CWE | CWE-125 |
11 Dec 2025, 16:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-12-11 16:16
Updated : 2025-12-12 15:18
NVD link : CVE-2025-55307
Mitre link : CVE-2025-55307
CVE.ORG link : CVE-2025-55307
JSON object : View
Products Affected
No product.
CWE
CWE-125
Out-of-bounds Read
