2026-04-27 11:0CVE-2026-5942Foxit
PUBLISHED5.2CWE-416

Foxit PDF Editor/Reader AcroForm Signature Use-After-Free Vulnerability

Flaws in page lifecycle management allow document structure changes to desynchronize internal component states, causing subsequent operations to access invalidated objects and crash the program.

Problem type

Affected products

Foxit Software Inc.

Foxit PDF Editor

Versions 2026.1 and earlier - AFFECTED

Versions 14.0.3 and earlier - AFFECTED

Versions 13.2.3 and earlier - AFFECTED

Foxit PDF Reader

Versions 2026.1 and earlier - AFFECTED

References

GitHub Security Advisories

GHSA-v92h-4968-3789

Flaws in page lifecycle management allow document structure changes to desynchronize internal...

https://github.com/advisories/GHSA-v92h-4968-3789

Flaws in page lifecycle management allow document structure changes to desynchronize internal component states, causing subsequent operations to access invalidated objects and crash the program.

JSON source

https://cveawg.mitre.org/api/cve/CVE-2026-5942
Click to expand
{
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2",
  "cveMetadata": {
    "cveId": "CVE-2026-5942",
    "assignerOrgId": "14984358-7092-470d-8f34-ade47a7658a2",
    "assignerShortName": "Foxit",
    "dateUpdated": "2026-04-27T11:00:33.818Z",
    "dateReserved": "2026-04-09T03:42:17.871Z",
    "datePublished": "2026-04-27T11:00:33.818Z",
    "state": "PUBLISHED"
  },
  "containers": {
    "cna": {
      "providerMetadata": {
        "orgId": "14984358-7092-470d-8f34-ade47a7658a2",
        "shortName": "Foxit",
        "dateUpdated": "2026-04-27T11:00:33.818Z"
      },
      "title": "Foxit PDF Editor/Reader AcroForm Signature Use-After-Free Vulnerability",
      "descriptions": [
        {
          "lang": "en",
          "value": "Flaws in page lifecycle management allow document structure changes to desynchronize internal component states, causing subsequent operations to access invalidated objects and crash the program.",
          "supportingMedia": [
            {
              "type": "text/html",
              "base64": false,
              "value": "Flaws in page lifecycle management allow document structure changes to desynchronize internal component states, causing subsequent operations to access invalidated objects and crash the program."
            }
          ]
        }
      ],
      "affected": [
        {
          "vendor": "Foxit Software Inc.",
          "product": "Foxit PDF Editor",
          "platforms": [
            "Windows"
          ],
          "defaultStatus": "unaffected",
          "versions": [
            {
              "version": "Versions 2026.1 and earlier",
              "status": "affected"
            },
            {
              "version": "Versions 14.0.3 and earlier",
              "status": "affected"
            },
            {
              "version": "Versions 13.2.3 and earlier",
              "status": "affected"
            }
          ]
        },
        {
          "vendor": "Foxit Software Inc.",
          "product": "Foxit PDF Reader",
          "defaultStatus": "unaffected",
          "versions": [
            {
              "version": "Versions 2026.1 and earlier",
              "status": "affected"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "lang": "en",
              "description": "CWE-416 Use after free",
              "cweId": "CWE-416",
              "type": "CWE"
            }
          ]
        }
      ],
      "references": [
        {
          "url": "https://www.foxit.com/support/security-bulletins.html"
        }
      ],
      "impacts": [
        {
          "descriptions": [
            {
              "lang": "en",
              "value": "Potential arbitrary code execution"
            }
          ]
        }
      ],
      "metrics": [
        {
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ],
          "cvssV3_1": {
            "version": "3.1",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
            "attackVector": "LOCAL",
            "attackComplexity": "LOW",
            "privilegesRequired": "NONE",
            "userInteraction": "REQUIRED",
            "scope": "UNCHANGED",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "availabilityImpact": "HIGH",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM"
          }
        }
      ],
      "credits": [
        {
          "lang": "en",
          "value": "Anonymous working with TrendAI Zero Day Initiative",
          "type": "finder"
        }
      ]
    }
  }
}