Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
| Link | Providers |
|---|---|
| https://www.foxit.com/support/security-bulletins.html |
|
Wed, 29 Apr 2026 17:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Foxit
Foxit pdf Editor Foxit pdf Reader |
|
| CPEs | cpe:2.3:a:foxit:pdf_editor:*:*:*:*:*:*:*:* cpe:2.3:a:foxit:pdf_reader:*:*:*:*:*:*:*:* |
|
| Vendors & Products |
Foxit
Foxit pdf Editor Foxit pdf Reader |
Tue, 28 Apr 2026 13:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
ssvc
|
Tue, 28 Apr 2026 08:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Foxitsoftware
Foxitsoftware foxit Pdf Editor Foxitsoftware foxit Reader |
|
| Vendors & Products |
Foxitsoftware
Foxitsoftware foxit Pdf Editor Foxitsoftware foxit Reader |
Mon, 27 Apr 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 27 Apr 2026 11:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A crafted XFA PDF can trigger a use-after-free condition during calculate event processing, causing the application to crash and resulting in an arbitrary code execution. | |
| Title | UAF in Foxit PDF Editor/Reader via XFA calculate event | |
| Weaknesses | CWE-416 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: Foxit
Published:
Updated: 2026-04-28T12:50:41.920Z
Reserved: 2026-04-09T03:42:09.733Z
Link: CVE-2026-5939
Updated: 2026-04-27T13:40:21.534Z
Status : Analyzed
Published: 2026-04-27T12:16:24.263
Modified: 2026-04-29T17:28:10.207
Link: CVE-2026-5939
No data.
OpenCVE Enrichment
Updated: 2026-04-28T20:00:19Z