2026-04-27 11:0CVE-2026-5941Foxit
PUBLISHED5.2CWE-20

Foxit PDF Editor/Reader AcroForm Signature Remote Code Execution Vulnerability

Parsing logic flaws cause non-signature data to be misidentified as valid signatures when processing malformed form field hierarchies, leading to invalid memory writes and program crashes during internal data structure construction.

Problem type

Affected products

Foxit Software Inc.

Foxit PDF Editor

Versions 2026.1 and earlier - AFFECTED

Versions 14.0.3 and earlier - AFFECTED

Foxit PDF Reader

Versions 2026.1 and earlier - AFFECTED

References

GitHub Security Advisories

GHSA-pxgr-8px7-gpc8

Parsing logic flaws cause non-signature data to be misidentified as valid signatures when...

https://github.com/advisories/GHSA-pxgr-8px7-gpc8

Parsing logic flaws cause non-signature data to be misidentified as valid signatures when processing malformed form field hierarchies, leading to invalid memory writes and program crashes during internal data structure construction.

JSON source

https://cveawg.mitre.org/api/cve/CVE-2026-5941
Click to expand
{
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2",
  "cveMetadata": {
    "cveId": "CVE-2026-5941",
    "assignerOrgId": "14984358-7092-470d-8f34-ade47a7658a2",
    "assignerShortName": "Foxit",
    "dateUpdated": "2026-04-27T11:00:25.495Z",
    "dateReserved": "2026-04-09T03:42:15.877Z",
    "datePublished": "2026-04-27T11:00:25.495Z",
    "state": "PUBLISHED"
  },
  "containers": {
    "cna": {
      "providerMetadata": {
        "orgId": "14984358-7092-470d-8f34-ade47a7658a2",
        "shortName": "Foxit",
        "dateUpdated": "2026-04-27T11:00:25.495Z"
      },
      "title": "Foxit PDF Editor/Reader AcroForm Signature Remote Code Execution Vulnerability",
      "descriptions": [
        {
          "lang": "en",
          "value": "Parsing logic flaws cause non-signature data to be misidentified as valid signatures when processing malformed form field hierarchies, leading to invalid memory writes and program crashes during internal data structure construction.",
          "supportingMedia": [
            {
              "type": "text/html",
              "base64": false,
              "value": "Parsing logic flaws cause non-signature data to be misidentified as valid signatures when processing malformed form field hierarchies, leading to invalid memory writes and program crashes during internal data structure construction."
            }
          ]
        }
      ],
      "affected": [
        {
          "vendor": "Foxit Software Inc.",
          "product": "Foxit PDF Editor",
          "platforms": [
            "Windows"
          ],
          "defaultStatus": "unaffected",
          "versions": [
            {
              "version": "Versions 2026.1 and earlier",
              "status": "affected"
            },
            {
              "version": "Versions 14.0.3 and earlier",
              "status": "affected"
            }
          ]
        },
        {
          "vendor": "Foxit Software Inc.",
          "product": "Foxit PDF Reader",
          "platforms": [
            "Windows"
          ],
          "defaultStatus": "unaffected",
          "versions": [
            {
              "version": "Versions 2026.1 and earlier",
              "status": "affected"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "lang": "en",
              "description": "CWE-20 Improper input validation",
              "cweId": "CWE-20",
              "type": "CWE"
            }
          ]
        }
      ],
      "references": [
        {
          "url": "https://www.foxit.com/support/security-bulletins.html"
        }
      ],
      "impacts": [
        {
          "descriptions": [
            {
              "lang": "en",
              "value": "Potential arbitrary code execution"
            }
          ]
        }
      ],
      "metrics": [
        {
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ],
          "cvssV3_1": {
            "version": "3.1",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "attackVector": "LOCAL",
            "attackComplexity": "LOW",
            "privilegesRequired": "NONE",
            "userInteraction": "REQUIRED",
            "scope": "UNCHANGED",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH"
          }
        }
      ],
      "credits": [
        {
          "lang": "en",
          "value": "Anonymous working with TrendAI Zero Day Initiative",
          "type": "finder"
        }
      ]
    }
  }
}