Malicious code vulnerabilities threaten Foxit PDF Reader and PDF Editor
Attackers can target the Foxit PDF Reader and PDF Editor applications. Security patches are available for download.
(Image: Artur Szczybylo/Shutterstock.com)
To prevent potential attacks under Windows, users of Foxit PDF Reader and PDF Editor should install the latest versions promptly. If this is not done, attackers can exploit several security vulnerabilities. So far, there are no indications from the software manufacturer of any ongoing attacks.
Several vulnerabilities closed
Videos by heise
In the security section of the Foxit website, the developers state that they have resolved the security issues in Foxit PDF Reader 2026.1.1 and Foxit PDF Editor 2026.1.1/14.0.4. In total, they have closed seven software vulnerabilities in the PDF applications. Only Windows PCs are threatened by the vulnerabilities.
If attackers successfully exploit the vulnerabilities, they can trigger DoS conditions and thus crashes (e.g., CVE-2026-5938 “medium”). However, it can also lead to the execution of malicious code (including CVE-2026-5943 “high”). To achieve this, attackers must provide victims with a prepared XFA file, which is then opened. Processing this file lacks proper checks, allowing malicious code to reach systems.
Last December, Foxit also had to fix highly risky security vulnerabilities in the Reader and Editor software for macOS and Windows.
(des)