Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2023-51551


Foxit PDF Reader AcroForm Signature Use-After-Free Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PDF Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of Signature objects. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-22003.


Published

2024-05-03T03:16:13.260

Last Modified

2025-08-13T15:35:22.587

Status

Analyzed

Source

[email protected]

Severity

CVSSv3.0: 7.8 (HIGH)

Weaknesses
  • Type: Secondary
    CWE-416

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application foxit pdf_editor ≤ 10.1.12.37872 Yes
Application foxit pdf_editor ≤ 11.2.7.53812 Yes
Application foxit pdf_editor ≤ 12.1.3.15356 Yes
Application foxit pdf_editor 13.0.0.21632 Yes
Application foxit pdf_editor 2023.1.0.15510 Yes
Application foxit pdf_editor 2023.2.0.21408 Yes
Application foxit pdf_reader ≤ 2023.2.0.21408 Yes
Operating System microsoft windows - No
Application foxit pdf_editor ≤ 11.1.5.0913 Yes
Application foxit pdf_editor ≤ 12.1.1.55342 Yes
Application foxit pdf_editor 13.0.0.61829 Yes
Application foxit pdf_editor 2023.1.0.55583 Yes
Application foxit pdf_editor 2023.2.0.61611 Yes
Application foxit pdf_reader ≤ 2023.2.0.61611 Yes
Operating System apple macos - No

References