CVE-2026-3775

Severity CVSS v4.0:
Pending analysis
Type:
CWE-427 Uncontrolled Search Path Element
Publication date:
01/04/2026
Last modified:
14/04/2026

Description

The application's update service, when checking for updates, loads certain system libraries from a search path that includes directories writable by low‑privileged users and is not strictly restricted to trusted system locations. Because these libraries may be resolved and loaded from user‑writable locations, a local attacker can place a malicious library there and have it loaded with SYSTEM privileges, resulting in local privilege escalation and arbitrary code execution.

Vulnerable products and versions

CPE From Up to
cpe:2.3:a:foxit:pdf_editor:*:*:*:*:*:*:*:* 13.2.2.24014 (including)
cpe:2.3:a:foxit:pdf_editor:*:*:*:*:*:*:*:* 14.0.0.33046 (including) 14.0.2.33402 (including)
cpe:2.3:a:foxit:pdf_editor:*:*:*:*:*:*:*:* 2023.1.0.15510 (including) 2023.3.0.23028 (including)
cpe:2.3:a:foxit:pdf_editor:*:*:*:*:*:*:*:* 2024.1.0.23997 (including) 2024.4.1.27687 (including)
cpe:2.3:a:foxit:pdf_editor:*:*:*:*:*:*:*:* 2025.1.0.27937 (including) 2025.3.0.35737 (including)
cpe:2.3:a:foxit:pdf_reader:*:*:*:*:*:*:*:* 2025.3.0.35737 (including)
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*


References to Advisories, Solutions, and Tools