Use-After-Free Vulnerability in Foxit PDF Reader on Windows and MacOS
CVE-2025-66495

7.8HIGH

Key Information:

Vendor

Foxit Inc.

Vendor
CVE Published:
19 December 2025

What is CVE-2025-66495?

A use-after-free vulnerability has been identified in the annotation handling component of Foxit PDF Reader. In versions prior to 2025.2.1, 14.0.1, and 13.2.1 on both Windows and MacOS platforms, maliciously crafted PDF files containing JavaScript can exploit this vulnerability. An attacker may leverage this issue to access or dereference a pointer to memory that has already been freed, potentially facilitating the execution of arbitrary code on the affected systems. This vulnerability poses significant security risks, as it can be triggered when a user opens a specially crafted PDF document.

Affected Version(s)

Foxit PDF Editor Windows Versions 2025.2.1 and earlier

Foxit PDF Editor Windows Versions 14.0.1 and earlier

Foxit PDF Editor Windows Versions 13.2.1 and eariler

References

CVSS V3.1

Score:
7.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

KX.H working with Trend Micro Zero Day Initiative
.
CVE-2025-66495 : Use-After-Free Vulnerability in Foxit PDF Reader on Windows and MacOS