CVE-2026-3775 in Foxit PDF Editorinfo

Summary

The application's update service, when checking for updates, loads certain system libraries from a search path that includes directories writable by low‑privileged users and is not strictly restricted to trusted system locations. Because these libraries may be resolved and loaded from user‑writable locations, a local attacker can place a malicious library there and have it loaded with SYSTEM privileges, resulting in local privilege escalation and arbitrary code execution.

Responsible

Foxit

Reservation

03/08/2026

Disclosure

04/01/2026

Entries

VulDB provides additional information and datapoints for this CVE:

Do you want to use VulDB in your project?

Use the official API to access entries easily!