Foxit PDF Editor and Reader before 2025.2.1 allow signature spoofing via triggers. An attacker can embed triggers (e.g., JavaScript) in a PDF document that execute during the signing process. When a signer reviews the document, the content appears normal. However, once the signature is applied, the triggers modify content on other pages or optional content layers without explicit warning. This can cause the signed PDF to differ from what the signer saw, undermining the trustworthiness of the digital signature. The fixed versions are 2025.2.1, 14.0.1, and 13.2.1.
References
| Link | Resource |
|---|---|
| https://www.foxit.com/support/security-bulletins.html | Vendor Advisory |
Configurations
Configuration 1 (hide)
| AND |
|
Configuration 2 (hide)
| AND |
|
History
15 Dec 2025, 20:17
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://www.foxit.com/support/security-bulletins.html - Vendor Advisory | |
| First Time |
Foxit
Microsoft windows Microsoft Foxit pdf Reader Apple macos Apple Foxit pdf Editor |
|
| CPE | cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:* cpe:2.3:a:foxit:pdf_editor:2025.1.0.27937:*:*:*:*:*:*:* cpe:2.3:a:foxit:pdf_editor:*:*:*:*:*:*:*:* cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:* cpe:2.3:a:foxit:pdf_editor:2025.2.0.33046:*:*:*:*:*:*:* cpe:2.3:a:foxit:pdf_editor:2025.1.0.66692:*:*:*:*:*:*:* cpe:2.3:a:foxit:pdf_reader:*:*:*:*:*:*:*:* cpe:2.3:a:foxit:pdf_editor:14.0.0.33046:*:*:*:*:*:*:* cpe:2.3:a:foxit:pdf_editor:2025.2.0.68868:*:*:*:*:*:*:* cpe:2.3:a:foxit:pdf_editor:14.0.0.68868:*:*:*:*:*:*:* |
11 Dec 2025, 16:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-12-11 16:16
Updated : 2025-12-15 20:17
NVD link : CVE-2025-59803
Mitre link : CVE-2025-59803
CVE.ORG link : CVE-2025-59803
JSON object : View
Products Affected
microsoft
- windows
foxit
- pdf_editor
- pdf_reader
apple
- macos
CWE
CWE-347
Improper Verification of Cryptographic Signature
