SB2026033195 - Multiple vulnerabilities in Foxit PDF Reader and PDF Editor for Windows
Published: March 31, 2026
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 7 secuirty vulnerabilities.
1) Information disclosure (CVE-ID: CVE-2026-3774)
The vulnerability allows a remote attacker to disclose sensitive information.
The vulnerability exists due to improper access control in redaction, encryption, and printing logic when processing PDFs with embedded JavaScript or document/print actions. A remote attacker can trick the victim into opening a specially crafted PDF to disclose sensitive information.
2) Insecure DLL loading (CVE-ID: CVE-2026-3775)
The vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to the application loads DLL libraries in an insecure manner. A remote attacker can place a specially crafted .dll file on a remote SMB fileshare, trick the victim into opening a crafted PDF and execute arbitrary code on victim's system.
3) Insecure DLL loading (CVE-ID: CVE-2026-3780)
The vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to the application loads DLL libraries in an insecure manner. A remote attacker can place a specially crafted .dll file on a remote SMB fileshare, trick the victim into opening a file, associated with the vulnerable application, and execute arbitrary code on victim's system.
4) NULL pointer dereference (CVE-ID: CVE-2026-3776)
The vulnerability allows a remote attacker to cause a denial of service.
The vulnerability exists due to null pointer dereference in stamp annotation handling when opening PDFs missing the appearance (AP) entry. A remote attacker can trick the victim into opening a specially crafted PDF file to cause a denial of service.
5) Use-after-free (CVE-ID: CVE-2026-3777)
The vulnerability allows a remote attacker to execute arbitrary code.
The vulnerability exists due to use-after-free in JavaScript handling when processing certain PDF documents. A remote attacker can trick the victim into opening a specially crafted PDF to execute arbitrary code.
6) Use-after-free (CVE-ID: CVE-2026-3779)
The vulnerability allows a remote attacker to execute arbitrary code.
The vulnerability exists due to use-after-free in document handling when processing certain PDFs with JavaScript. A remote attacker can trick the victim into opening a specially crafted PDF to execute arbitrary code.
7) Uncontrolled Recursion (CVE-ID: CVE-2026-3778)
The vulnerability allows a remote attacker to crash the application.
The vulnerability exists due to uncontrolled recursion in object reference handling when processing PDFs with cyclic references. A remote attacker can trick the victim into opening a specially crafted PDF file to cause a stack overflow and crash the application.
Remediation
Install update from vendor's website.