Foxit PDF Reader exportXFAData Exposed Dangerous Method Remote Code Execution Vulnerability
CVE-2023-27363

7.8HIGH

Key Information:

Vendor
Foxit
Vendor
CVE Published:
3 May 2024

Summary

A vulnerability exists within the exportXFAData method in Foxit PDF Reader that allows for the execution of arbitrary code. This flaw exposes a JavaScript interface that can be exploited by remote attackers to write files. Successful exploitation requires user interaction, as the target must either visit a malicious webpage or open a compromised file. This could lead to severe consequences for affected installations, as it allows attackers to run code in the context of the current user.

Affected Version(s)

PDF Reader 12.1.0.15250

References

EPSS Score

55% chance of being exploited in the next 30 days.

CVSS V3.1

Score:
7.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.