The application's installer runs with elevated privileges but resolves system executables and DLLs using untrusted search paths that can include user-writable directories, allowing a local attacker to place malicious binaries with the same names and have them loaded or executed instead of the legitimate system files, resulting in local privilege escalation.

Project Subscriptions

No data.

Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Wed, 01 Apr 2026 02:15:00 +0000

Type Values Removed Values Added
Description The application's installer runs with elevated privileges but resolves system executables and DLLs using untrusted search paths that can include user-writable directories, allowing a local attacker to place malicious binaries with the same names and have them loaded or executed instead of the legitimate system files, resulting in local privilege escalation.
Title Foxit PDF Editor/Reader Installer Uncontrolled Search Path Privilege Escalation
Weaknesses CWE-426
References
Metrics cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: Foxit

Published:

Updated: 2026-04-01T01:40:33.511Z

Reserved: 2026-03-08T03:43:30.840Z

Link: CVE-2026-3780

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-04-01T02:16:03.183

Modified: 2026-04-01T02:16:03.183

Link: CVE-2026-3780

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses