Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
| Link | Providers |
|---|---|
| https://www.foxit.com/support/security-bulletins.html |
|
Wed, 29 Apr 2026 17:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Foxit
Foxit pdf Editor Foxit pdf Reader |
|
| CPEs | cpe:2.3:a:foxit:pdf_editor:*:*:*:*:*:*:*:* cpe:2.3:a:foxit:pdf_reader:*:*:*:*:*:*:*:* |
|
| Vendors & Products |
Foxit
Foxit pdf Editor Foxit pdf Reader |
Tue, 28 Apr 2026 08:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Foxitsoftware
Foxitsoftware foxit Pdf Editor Foxitsoftware foxit Reader |
|
| Vendors & Products |
Foxitsoftware
Foxitsoftware foxit Pdf Editor Foxitsoftware foxit Reader |
Mon, 27 Apr 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 27 Apr 2026 11:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Document structural anomalies caused inconsistencies between page element relationships and internal index states. When scripts triggered document modifications, object reference validity was not properly maintained, leading to a crash when accessing an invalid pointer during page information queries. | |
| Title | Foxit PDF Editor/Reader AcroForm Annotation Use-After-Free Remote Code Execution Vulnerability | |
| Weaknesses | CWE-416 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: Foxit
Published:
Updated: 2026-04-28T03:55:23.507Z
Reserved: 2026-04-09T03:42:20.240Z
Link: CVE-2026-5943
Updated: 2026-04-27T13:40:20.491Z
Status : Analyzed
Published: 2026-04-27T12:16:24.717
Modified: 2026-04-29T17:18:04.043
Link: CVE-2026-5943
No data.
OpenCVE Enrichment
Updated: 2026-04-28T08:30:13Z