First published: Tue Jan 04 2022(Updated: )
Foxit PDF Reader and PDF Editor before 11.1 on macOS allow remote attackers to execute arbitrary code via xfa.host.gotoURL in the XFA API.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Any of | ||
Foxit PDF Editor for Mac | <11.1 | |
Foxit Reader | <11.1 | |
Apple iOS and macOS | ||
Foxit PDF Editor for Mac | <11.1 | |
Foxit Reader | <11.1 | |
Apple iOS and macOS |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-45978 has been assessed as a high severity vulnerability due to its potential for remote code execution.
To mitigate CVE-2021-45978, users should update Foxit PDF Reader and PDF Editor to version 11.1 or later.
CVE-2021-45978 affects versions of Foxit PDF Reader and PDF Editor prior to 11.1.
CVE-2021-45978 is a remote code execution vulnerability that can be exploited via the XFA API.
Remote attackers with the ability to manipulate XFA API calls can exploit CVE-2021-45978 to execute arbitrary code.