Skip to main content
Mallory

Foxit PDF Editor Cloud XSS Vulnerabilities Patched

cloud-service-vulnerabilitywidely-deployed-product-advisoryinternet-facing-service-vulnerability
Updated March 21, 2026 at 02:38 PM2 sources
Share:
Foxit PDF Editor Cloud XSS Vulnerabilities Patched

Get Ahead of Threats Like This

Know if you're exposed. Before adversaries strike.

Foxit released security updates for Foxit PDF Editor Cloud (and related Foxit eSign components) to address two cross-site scripting (XSS) flaws that could allow arbitrary JavaScript execution in a victim’s browser when handling crafted content. The issues are tracked as CVE-2026-1591 and CVE-2026-1592 (both CWE-79) and were attributed to insufficient input validation and improper output encoding that allowed untrusted data to be embedded into the application’s HTML.

The vulnerable functionality includes the File Attachments list and Layers panel, where attackers could inject payloads via crafted attachment filenames or manipulated layer names inside PDFs, requiring user interaction (e.g., opening/interacting with malicious documents) and typically authenticated access. Both CVEs are rated moderate severity with CVSS v3.0 6.3; exploitation could expose sensitive information available to the user’s session (e.g., document contents and session data). Foxit’s guidance is to ensure affected services are updated; the most recent referenced update for PDF Editor Cloud was released February 3, 2026.

Timeline

  1. Feb 3, 2026

    Foxit patches two XSS flaws in PDF Editor Cloud

    On 2026-02-03, Foxit released security updates for Foxit PDF Editor Cloud to address CVE-2026-1591 and CVE-2026-1592, two moderate-severity XSS vulnerabilities in the File Attachments list and Layers panel. The flaws could allow arbitrary JavaScript execution in a user's browser and potentially expose document contents or session data if a user interacted with crafted content.

  2. Jan 15, 2026

    Foxit eSign patch released for XSS flaw CVE-2025-66523

    Foxit released a security update for Foxit eSign on 2026-01-15 to fix CVE-2025-66523, a cross-site scripting vulnerability caused by improper handling of URL parameters in crafted links. Foxit said the issue was fully patched through its standard update process.

See the full picture in Mallory

Mallory subscribers get deeper analysis on every story, including:

Impact Assessment

Who’s affected and how

Technical Details

Deep-dive technical analysis

Response Recommendations

Actionable next steps for your team

Indicators of Compromise

IPs, domains, hashes, and more

AI Threads

Ask questions and take action on every story

Advanced Filters

Filter by topic, classification, timeframe

Scheduled Alerts

Get matching stories delivered automatically

Sources

thecyberexpress com vulnerabilities
Foxit PDF Editor XSS Flaws Patched In February 2026
February 4, 2026 at 06:34 AM

Related Stories

16 Vulnerabilities in Apryse WebViewer and Foxit PDF Cloud Services Enable Account Takeover and Data Theft

16 Vulnerabilities in Apryse WebViewer and Foxit PDF Cloud Services Enable Account Takeover and Data Theft

Researchers at **Novee** reported **16 vulnerabilities** affecting widely deployed PDF platforms **Apryse WebViewer** (formerly PDFTron) and **Foxit PDF cloud services/SDK components**, warning they could be exploited for **account hijacking, data theft, and in some cases remote code execution**. Reported issue classes include **DOM-based, stored, and reflected XSS**, **server-side request forgery (SSRF)**, **path traversal**, and **OS command injection**; testing indicated attackers could trigger exploitation via **crafted documents, messages, or URLs**, with elevated risk when these viewers are embedded inside **authenticated enterprise applications** and trusted domains. Technical details highlighted that Apryse WebViewer spans multiple trust boundaries (a React-based iframe UI ingesting untrusted inputs such as query strings and `postMessage`, a JavaScript/WebAssembly document engine, and server-side SDK services), and that insufficient validation across these boundaries enabled exploitation paths. The most severe issue described was a **critical OS command injection (CVSS 9.8)** in Foxit’s Node.js signature server component, where a POST body parameter was reportedly concatenated into a command execution path. Both **Apryse** and **Foxit** stated the findings were **responsibly disclosed** and addressed via **patches, updates, and configuration changes**, with additional security hardening performed during remediation.

1 months ago
Multiple Vulnerabilities Disclosed in Foxit PDF Reader and Editor

Multiple Vulnerabilities Disclosed in Foxit PDF Reader and Editor

German authorities published advisories for **multiple vulnerabilities** affecting **Foxit PDF Reader** and **Foxit PDF Editor**, indicating ongoing security issues across the vendor's desktop PDF products. The notices identify separate advisory entries, `2026-0914` and `2026-1256`, covering flaws in both **Reader** and **Editor** and signaling that organizations using Foxit software should review the affected versions and available vendor guidance. The repeated disclosures suggest a broader patch-management concern for enterprises that rely on Foxit for document handling, particularly because PDF applications are common targets for malicious document-based exploitation. Security teams should prioritize validating installed Foxit versions, applying relevant updates, and monitoring for suspicious PDF-related activity on endpoints where Foxit Reader or Editor is deployed.

6 days ago
PDF Ecosystem Vulnerabilities Enable One-Click Attacks and PDF Object Injection

PDF Ecosystem Vulnerabilities Enable One-Click Attacks and PDF Object Injection

Security researchers reported multiple previously unknown weaknesses across the PDF ecosystem that can be exploited through crafted documents. Novee Security’s research into *Foxit* and *Apryse* PDF platforms described **13 vulnerability categories** and **16 exploit paths**, including **critical XSS** and **OS command injection**, with “one-click” scenarios where simply opening a document could trigger compromise and potentially enable account takeover or backend command execution. Separately, a high-severity flaw in the widely used *jsPDF* library was disclosed as **CVE-2026-25755** (CVSS **8.8**), enabling **PDF object injection** via improper sanitization in the `addJS` method. By breaking out of the `/JS (...)` string (e.g., injecting `) >> /Action ...`), an attacker can inject arbitrary PDF structures and actions such as `/OpenAction`, potentially triggering behavior even when JavaScript is disabled in the viewer and enabling document manipulation (e.g., altering `/Annots` or `/Signatures`) across different PDF viewers, including lightweight mobile/embedded parsers.

1 months ago

Get Ahead of Threats Like This

Mallory continuously monitors global threat intelligence and correlates it with your attack surface. Know if you're exposed. Before adversaries strike.