SB2026033195 - Multiple vulnerabilities in Foxit PDF Reader and PDF Editor for Windows



SB2026033195 - Multiple vulnerabilities in Foxit PDF Reader and PDF Editor for Windows

Published: March 31, 2026

Security Bulletin ID SB2026033195
Severity
High
Patch available
YES
Number of vulnerabilities 7
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

High 57% Medium 14% Low 29%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 7 secuirty vulnerabilities.


1) Information disclosure (CVE-ID: CVE-2026-3774)

The vulnerability allows a remote attacker to disclose sensitive information.

The vulnerability exists due to improper access control in redaction, encryption, and printing logic when processing PDFs with embedded JavaScript or document/print actions. A remote attacker can trick the victim into opening a specially crafted PDF to disclose sensitive information.


2) Insecure DLL loading (CVE-ID: CVE-2026-3775)

The vulnerability allows a remote attacker to compromise vulnerable system.

The vulnerability exists due to the application loads DLL libraries in an insecure manner. A remote attacker can place a specially crafted .dll file on a remote SMB fileshare, trick the victim into opening a crafted PDF and execute arbitrary code on victim's system.


3) Insecure DLL loading (CVE-ID: CVE-2026-3780)

The vulnerability allows a remote attacker to compromise vulnerable system.

The vulnerability exists due to the application loads DLL libraries in an insecure manner. A remote attacker can place a specially crafted .dll file on a remote SMB fileshare, trick the victim into opening a file, associated with the vulnerable application, and execute arbitrary code on victim's system.


4) NULL pointer dereference (CVE-ID: CVE-2026-3776)

The vulnerability allows a remote attacker to cause a denial of service.

The vulnerability exists due to null pointer dereference in stamp annotation handling when opening PDFs missing the appearance (AP) entry. A remote attacker can trick the victim into opening a specially crafted PDF file to cause a denial of service.


5) Use-after-free (CVE-ID: CVE-2026-3777)

The vulnerability allows a remote attacker to execute arbitrary code.

The vulnerability exists due to use-after-free in JavaScript handling when processing certain PDF documents. A remote attacker can trick the victim into opening a specially crafted PDF to execute arbitrary code.


6) Use-after-free (CVE-ID: CVE-2026-3779)

The vulnerability allows a remote attacker to execute arbitrary code.

The vulnerability exists due to use-after-free in document handling when processing certain PDFs with JavaScript. A remote attacker can trick the victim into opening a specially crafted PDF to execute arbitrary code.


7) Uncontrolled Recursion (CVE-ID: CVE-2026-3778)

The vulnerability allows a remote attacker to crash the application.

The vulnerability exists due to uncontrolled recursion in object reference handling when processing PDFs with cyclic references. A remote attacker can trick the victim into opening a specially crafted PDF file to cause a stack overflow and crash the application.


Remediation

Install update from vendor's website.