Malicious code vulnerabilities threaten Foxit PDF Reader and PDF Editor

Attackers can target the Foxit PDF Reader and PDF Editor applications. Security patches are available for download.

listen Print view
A symbolic update reminder.

(Image: Artur Szczybylo/Shutterstock.com)

1 min. read

To prevent potential attacks under Windows, users of Foxit PDF Reader and PDF Editor should install the latest versions promptly. If this is not done, attackers can exploit several security vulnerabilities. So far, there are no indications from the software manufacturer of any ongoing attacks.

Videos by heise

In the security section of the Foxit website, the developers state that they have resolved the security issues in Foxit PDF Reader 2026.1.1 and Foxit PDF Editor 2026.1.1/14.0.4. In total, they have closed seven software vulnerabilities in the PDF applications. Only Windows PCs are threatened by the vulnerabilities.

If attackers successfully exploit the vulnerabilities, they can trigger DoS conditions and thus crashes (e.g., CVE-2026-5938 “medium”). However, it can also lead to the execution of malicious code (including CVE-2026-5943 “high”). To achieve this, attackers must provide victims with a prepared XFA file, which is then opened. Processing this file lacks proper checks, allowing malicious code to reach systems.

Last December, Foxit also had to fix highly risky security vulnerabilities in the Reader and Editor software for macOS and Windows.

(des)

Don't miss any news – follow us on Facebook, LinkedIn or Mastodon.

This article was originally published in German. It was translated with technical assistance and editorially reviewed before publication.