16 Zero-Day Vulnerabilities Found in Apryse and Foxit PDF Platforms


Novee Security uncovered 16 zero-day vulnerabilities in Apryse WebViewer and Foxit PDF cloud services. These flaws enable remote code execution, data exfiltration, and cross-site scripting. Both vendors received advance notice and released patches before public disclosure.

The vulnerabilities span UI layers, document engines, and server-side components. Attackers can exploit them without authentication in many cases. Enterprises using these tools for PDF handling face high risks to internal networks and user data.

Novee used an AI-assisted method with human oversight. Their agents mapped attack paths across complex codebases efficiently.

Critical Vulnerabilities Breakdown

The worst issue is OS Command Injection in Foxit PDF SDK for Web. It scores CVSS 9.8. Unsanitized POST data hits process.execSync() directly, allowing shell command execution via one request.

Apryse WebViewer suffers SSRF via iFrame rendering (CVE-2025-70400). Attackers force servers to fetch internal resources. Another critical DOM XSS (CVE-2025-70402) uses uiConfig JSON to inject malicious SVG payloads, bypassing standard parsers for account takeover.

Stored DOM XSS in annotation fields (CVE-2025-70401) triggers on every re-render. Foxit calculator mishandles postMessage origins (CVE-2025-66500), letting remote scripts run in trusted contexts.

Crafted annotation (Source – Novee)

Vulnerabilities Table

VendorVulnerability TypeSeverityCVE ID
ApryseDOM XSS via uiConfigCriticalCVE-2025-70402
ApryseStored DOM XSS (annotations)HighCVE-2025-70401
ApryseSSRF (iFrame rendering)HighCVE-2025-70400
FoxitOS Command Injection (SDK)CriticalNot assigned
FoxitPath Traversal (Collaboration)HighNot assigned
FoxitDOM XSS (postMessage handler)MediumCVE-2025-66500
FoxitMultiple Stored XSS (Portfolio, Templates, etc.)MediumCVE-2025-665xx

Foxit also has path traversal exposing /etc listings and ten more XSS flaws across features like eSign and attachments. WAF bypasses exist too.

Attack Impact Areas

  • Remote code execution on servers via command injection.
  • Internal network scans through SSRF.
  • Account takeovers from DOM XSS chains.
  • Persistent scripts in stored annotations and UI elements.

These hit millions of users in enterprises worldwide. PDF platforms process untrusted files daily, amplifying exposure.

Bypass – one POST, full RCE (Source – Novee)

Immediate Protection Steps

  • Update Apryse WebViewer and Foxit SDK to patched versions now.
  • Add default cases in switch statements for input validation.
  • Enforce Content-Security-Policy on all embeds.
  • Validate postMessage origins strictly.

Teams should audit deployments for exposed signature servers. Scan logs for exploit traces like unusual curl spawns or directory listings.

FAQ

What causes the Foxit OS Command Injection?

The md POST parameter concatenates into process.execSync() without sanitization. No default switch case lets shell metacharacters through.

How does Apryse DOM XSS work?

Malicious uiConfig JSON injects SVG foreignObject payloads. They bypass DOMParser and run in Icon.js via dangerouslySetInnerHTML.

Are patches available for all 16 zero-days?

Yes. Vendors coordinated fixes pre-disclosure. Check release notes for Apryse and Foxit.

Which PDF features are most affected?

Foxit Collaboration, eSign, Portfolio. Apryse iFrame rendering and annotations.

How to detect active exploits?

Monitor for fs.readdir() on sensitive paths. Watch fs_usage for attacker curl processes. Review annotation author fields.

Readers help support VPNCentral. We may get a commission if you buy through our links. Tooltip Icon

Read our disclosure page to find out how can you help VPNCentral sustain the editorial team Read more

User forum

0 messages