CVE-2026-3777Use After Free in Software INC Foxit PDF Editor

CWE-416Use After Free3 documents3 sources
Severity
5.5MEDIUMNVD
EPSS
0.0%
top 96.35%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedApr 1

Description

The application does not properly validate the lifetime and validity of internal view cache pointers after JavaScript changes the document zoom and page state. When a script modifies the zoom property and then triggers a page change, the original view object may be destroyed while stale pointers are still kept and later dereferenced, which under crafted JavaScript and document structures can lead to a use-after-free condition and potentially allow arbitrary code execution.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:HExploitability: 1.8 | Impact: 3.6

Affected Packages2 packages

CVEListV5foxit_software_inc/foxit_pdf_editorVersions 13.2.2 and earlier, Versions 14.0.2 and earlier, Versions 2025.3 and earlier+2
CVEListV5foxit_software_inc/foxit_pdf_readerVersions 2025.3 and earlier

🔴Vulnerability Details

2
CVEList
Use after free of view cache in Foxit PDF Editor/Reader2026-04-01
GHSA
GHSA-6xgc-8m9r-qvgm: The application does not properly validate the lifetime and validity of internal view cache pointers after JavaScript changes the document zoom and pa2026-04-01
CVE-2026-3777 — Use After Free | cvebase