In Foxit PDF Reader before 2024.1 and PDF Editor before 2024.1, code execution via JavaScript could occur because of an unoptimized prompt message for users to review parameters of commands.
References
| Link | Resource |
|---|---|
| https://www.foxit.com/support/security-bulletins.html | Vendor Advisory |
| https://www.foxit.com/support/security-bulletins.html | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
23 May 2025, 14:45
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Foxit
Foxit pdf Reader Foxit pdf Editor |
|
| References | () https://www.foxit.com/support/security-bulletins.html - Vendor Advisory | |
| CPE | cpe:2.3:a:foxit:pdf_editor:*:*:*:*:*:*:*:* cpe:2.3:a:foxit:pdf_reader:*:*:*:*:*:*:*:* |
29 Mar 2025, 00:15
| Type | Values Removed | Values Added |
|---|---|---|
| CWE | CWE-450 |
Information
Published : 2024-03-05 21:15
Updated : 2025-05-23 14:45
NVD link : CVE-2024-25858
Mitre link : CVE-2024-25858
CVE.ORG link : CVE-2024-25858
JSON object : View
Products Affected
foxit
- pdf_editor
- pdf_reader
CWE
CWE-450
Multiple Interpretations of UI Input
