Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
TeamPCP Compromises Checkmarx Jenkins Compromised Plugin
May 12, 2026
Android Zero-Click Vulnerability Enables Remote Shell Access
May 12, 2026
TrickMo Android Malware Targets Banking & Wallet Apps
May 12, 2026
Home/CyberSecurity News/Foxit PDF Editor Flaws Allow Arbitrary JavaScript Execution
CyberSecurity News

Foxit PDF Editor Flaws Allow Arbitrary JavaScript Execution

Foxit has rolled out security updates to address critical cross-site scripting (XSS) vulnerabilities discovered in its PDF Editor Cloud. These flaws, if exploited, could allow attackers to execute...

David kimber
David kimber
February 3, 2026 2 Min Read
2 0

Foxit has rolled out security updates to address critical cross-site scripting (XSS) vulnerabilities discovered in its PDF Editor Cloud. These flaws, if exploited, could allow attackers to execute arbitrary JavaScript code directly within users’ browsers.

The vulnerabilities were discovered in the application’s File Attachments list and Layers panel, where insufficient input validation and improper output encoding create pathways for malicious code execution.

Two related cross-site scripting vulnerabilities have been identified and assigned CVE-2026-1591 and CVE-2026-1592.

Both vulnerabilities stem from the same root cause: inadequate sanitization of user inputs in layer names and attachment file names.

When users interact with crafted payloads through the File Attachments list or Layers panel.

CVE ID Vulnerability Type CVSS Score Severity Impact
CVE-2026-1591 Cross-site Scripting (CWE-79) 6.3 Moderate Arbitrary JavaScript Execution
CVE-2026-1592 Cross-site Scripting (CWE-79) 6.3 Moderate Arbitrary JavaScript Execution

The application fails to properly encode untrusted input before embedding it into the HTML structure, enabling arbitrary JavaScript execution within the user’s browser context.

The vulnerabilities are classified under CWE-79 (Cross-site Scripting) and carry a CVSS 3.0 score of 6.3, indicating moderate severity.

The attack vector is network-based (AV:N) with low attack complexity (AC:L), requiring low privileges (PR:L) and user interaction (UI:R).

The impact assessment reveals high confidentiality risk with limited integrity impact and no availability impact.

An attacker exploiting these vulnerabilities could access sensitive information visible to the authenticated user, including document contents and session data.

The requirement for user interaction and authenticated access limits the attack surface somewhat, as attackers must first trick users into opening malicious documents or convince them to interact with specially crafted files.

However, the moderate severity rating reflects the realistic threat posed by these XSS flaws in a widely-used PDF editing application.

Remediation and Response

Foxit has released security patches addressing both vulnerabilities as part of the February 3, 2026 update to Foxit PDF Editor Cloud.

The company emphasizes that no user action is required for Cloud versions, as updates are deployed automatically.

Users running desktop versions should check available updates through the application’s update mechanism.

Organizations using Foxit PDF Editor should verify that their installations are running the latest patched version.

The security response team recommends reviewing file handling practices and limiting user access to PDF editing features where appropriate within your organization’s security policies.

For security inquiries, Foxit’s Security Response Team can be reached at [email protected]. Additional security advisories and vulnerability reporting information are available on Foxit’s official security page.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackCVEExploitPatchSecurityThreatVulnerability

Share Article

David kimber

David kimber

David is a penetration tester turned security journalist with expertise in mobile security, IoT vulnerabilities, and exploit development. As an OSCP-certified security professional, David brings hands-on technical experience to his reporting on vulnerabilities and security research. His articles often feature detailed technical analysis of exploits and provide actionable defense recommendations. David maintains an active presence in the security research community and has contributed to multiple open-source security tools.

Previous Post

PDFly PyInstaller Mod Forces Decryption Reverse- Variant Uses

Next Post

CISO Decision: Strengthen Incident Prevention & Security

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
Exploit: Hackers Take Over cPanel Abuse CVE-2026-41940
May 12, 2026
TanStack npm Supply-Chain Attack Hacks CI Credentials
May 12, 2026
Google Warns: Hackers Use AI to Create Zero- Using Working
May 11, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Jennifer sherman
Jennifer sherman
Sarah simpson
Sarah simpson
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us