Cyber Posture

CVE-2026-3777

Medium

Published: 01 April 2026

Published
01 April 2026
Modified
14 April 2026
KEV Added
Patch
CVSS Score 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
EPSS Score 0.0002 4.7th percentile
Risk Priority 11 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-3777 is a medium-severity Use After Free (CWE-416) vulnerability in Foxit Pdf Editor. Its CVSS base score is 5.5 (Medium).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Client Execution (T1203); ranked at the 4.7th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 RA-5 (Vulnerability Monitoring and Scanning) and SI-16 (Memory Protection).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploitation for Client Execution (T1203) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly requires timely patching of the use-after-free flaw in Foxit software per vendor security bulletins, eliminating the vulnerability root cause.

prevent

Implements memory protections such as ASLR and DEP to prevent unauthorized code execution from stale pointer dereferences in use-after-free scenarios.

detect

Conducts vulnerability scanning to identify and prioritize remediation of CVE-2026-3777 in deployed Foxit software instances.

MITRE ATT&CK Enterprise TechniquesAI

T1203 Exploitation for Client Execution Execution
Adversaries may exploit software vulnerabilities in client applications to execute code.
T1204.002 Malicious File Execution
An adversary may rely upon a user opening a malicious file in order to gain execution.
Why these techniques?

Use-after-free in Foxit PDF reader triggered by crafted JS in malicious document leads to RCE on user open; directly enables client-side exploitation (T1203) via malicious file (T1204.002).

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

The application does not properly validate the lifetime and validity of internal view cache pointers after JavaScript changes the document zoom and page state. When a script modifies the zoom property and then triggers a page change, the original view…

more

object may be destroyed while stale pointers are still kept and later dereferenced, which under crafted JavaScript and document structures can lead to a use-after-free condition and potentially allow arbitrary code execution.

Deeper analysisAI

CVE-2026-3777 is a use-after-free vulnerability (CWE-416) affecting Foxit software, published on 2026-04-01. The application fails to properly validate the lifetime and validity of internal view cache pointers after JavaScript changes the document zoom and page state. Specifically, when a script modifies the zoom property and then triggers a page change, the original view object may be destroyed while stale pointers are still retained and later dereferenced, leading to a use-after-free condition that can enable arbitrary code execution under crafted JavaScript and document structures.

The vulnerability has a CVSS v3.1 base score of 5.5 (AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H), indicating local access is required with low attack complexity, no privileges, and user interaction. A local attacker can exploit it by providing a malicious document containing crafted JavaScript that manipulates zoom and page state, tricking the user into processing it, potentially causing a crash (high availability impact) or achieving arbitrary code execution.

Mitigation details are available in Foxit's security bulletins at https://www.foxit.com/support/security-bulletins.html.

Details

CWE(s)

Affected Products

foxit
pdf editor
≤ 13.2.2.24014 · 14.0.0.33046 — 14.0.2.33402 · 2023.1.0.15510 — 2023.3.0.23028
foxit
pdf reader
≤ 2025.3.0.35737 · ≤ 2025.3.0.69570

CVEs Like This One

CVE-2025-21159Same product: Apple Macos
CVE-2026-21326Same product: Apple Macos
CVE-2026-27277Same product: Apple Macos
CVE-2026-27283Same product: Apple Macos
CVE-2026-21287Same product: Apple Macos
CVE-2026-21323Same product: Apple Macos
CVE-2026-21351Same product: Apple Macos
CVE-2026-21320Same product: Apple Macos
CVE-2026-21329Same product: Apple Macos
CVE-2026-27309Same product: Apple Macos

References