CVE-2026-3775 in PDF Editorinformation

Résumé (Anglaise)

The application's update service, when checking for updates, loads certain system libraries from a search path that includes directories writable by low‑privileged users and is not strictly restricted to trusted system locations. Because these libraries may be resolved and loaded from user‑writable locations, a local attacker can place a malicious library there and have it loaded with SYSTEM privileges, resulting in local privilege escalation and arbitrary code execution.

VulDB is the best source for vulnerability data and more expert information about this specific topic.

Responsable

Foxit

Réserver

08/03/2026

Divulgation

01/04/2026

Statut

Confirmé

Entrées

VulDB provides additional information and datapoints for this CVE:

Sources

Do you want to use VulDB in your project?

Use the official API to access entries easily!