Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
| Link | Providers |
|---|---|
| https://www.foxit.com/support/security-bulletins.html |
|
Tue, 14 Apr 2026 18:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Foxit
Foxit pdf Editor Foxit pdf Reader Microsoft Microsoft windows |
|
| CPEs | cpe:2.3:a:foxit:pdf_editor:*:*:*:*:*:*:*:* cpe:2.3:a:foxit:pdf_reader:*:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:* |
|
| Vendors & Products |
Foxit
Foxit pdf Editor Foxit pdf Reader Microsoft Microsoft windows |
Fri, 03 Apr 2026 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Foxitsoftware
Foxitsoftware foxit Pdf Editor Foxitsoftware foxit Reader |
|
| Vendors & Products |
Foxitsoftware
Foxitsoftware foxit Pdf Editor Foxitsoftware foxit Reader |
Wed, 01 Apr 2026 23:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 01 Apr 2026 02:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The application's update service, when checking for updates, loads certain system libraries from a search path that includes directories writable by low‑privileged users and is not strictly restricted to trusted system locations. Because these libraries may be resolved and loaded from user‑writable locations, a local attacker can place a malicious library there and have it loaded with SYSTEM privileges, resulting in local privilege escalation and arbitrary code execution. | |
| Title | Foxit PDF Editor/Reader Update Service Uncontrolled Search Path Element Local Privilege Escalation Vulnerability | |
| Weaknesses | CWE-427 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: Foxit
Published:
Updated: 2026-04-02T02:11:52.749Z
Reserved: 2026-03-08T03:42:27.208Z
Link: CVE-2026-3775
Updated: 2026-04-01T14:16:42.873Z
Status : Analyzed
Published: 2026-04-01T02:16:02.440
Modified: 2026-04-14T17:56:31.173
Link: CVE-2026-3775
No data.
OpenCVE Enrichment
Updated: 2026-04-15T16:45:09Z