Remote Code Execution Vulnerability in Foxit PDF Editor by Foxit
CVE-2022-37378

7.8HIGH

Key Information:

Vendor
Foxit
Vendor
CVE Published:
29 March 2023

Summary

A remote code execution vulnerability exists in Foxit PDF Editor due to improper handling of JavaScript functions. This flaw allows attackers to execute arbitrary code on affected installations. Exploitation requires user interaction, where users must either visit a malicious webpage or open a specially crafted file. The vulnerability arises from the software's failure to validate object existence before operations, enabling attackers to execute arbitrary code within the context of the current process. For detailed information, visit Foxit’s security bulletins or the Zero Day Initiative advisory.

Affected Version(s)

PDF Editor 11.1.1.53537

References

EPSS Score

5% chance of being exploited in the next 30 days.

CVSS V3.1

Score:
7.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

DoHyun Lee(@l33d0hyun) of DNSLab, Korea University
.