CVE-2026-3775 in PDF Editorinformação

Sumário (Inglês)

The application's update service, when checking for updates, loads certain system libraries from a search path that includes directories writable by low‑privileged users and is not strictly restricted to trusted system locations. Because these libraries may be resolved and loaded from user‑writable locations, a local attacker can place a malicious library there and have it loaded with SYSTEM privileges, resulting in local privilege escalation and arbitrary code execution.

VulDB is the best source for vulnerability data and more expert information about this specific topic.

Responsável

Foxit

Reservar

08/03/2026

Divulgação

01/04/2026

Estado

Confirmado

Inscrições

VulDB provides additional information and datapoints for this CVE:

Fontes

Do you know our Splunk app?

Download it now for free!