Foxit PDF Reader <  4.3.1.0218 exposes a JavaScript API function, createDataObject(), that allows untrusted PDF content to write arbitrary files anywhere on disk. By embedding a malicious PDF that calls this API, an attacker can drop executables or scripts into privileged folders, leading to code execution the next time the system boots or the user logs in.
History

Thu, 21 Aug 2025 13:00:00 +0000

Type Values Removed Values Added
First Time appeared Foxitsoftware
Foxitsoftware foxit Reader
Vendors & Products Foxitsoftware
Foxitsoftware foxit Reader

Wed, 20 Aug 2025 15:45:00 +0000

Type Values Removed Values Added
Description Foxit PDF Reader <  4.3.1.0218 exposes a JavaScript API function, createDataObject(), that allows untrusted PDF content to write arbitrary files anywhere on disk. By embedding a malicious PDF that calls this API, an attacker can drop executables or scripts into privileged folders, leading to code execution the next time the system boots or the user logs in.
Title Foxit PDF Reader < 4.3.1.0218 JavaScript File Write
Weaknesses CWE-73
References
Metrics cvssV4_0

{'score': 8.4, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published: 2025-08-20T15:33:20.083Z

Updated: 2025-08-20T15:33:20.083Z

Reserved: 2025-08-19T15:24:59.359Z

Link: CVE-2011-10030

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2025-08-20T16:15:36.150

Modified: 2025-08-20T16:15:36.150

Link: CVE-2011-10030

cve-icon Redhat

No data.