A privilege escalation vulnerability exists during the installation of Foxit PDF Editor via the Microsoft Store. A low-privilege user can replace files during the installation process, which may result in unintended elevation of privileges.
The versions below were either tested or verified to be vulnerable by Talos or confirmed to be vulnerable by the vendor.
Foxit PDF Editor 2025.2.0.33046
Foxit PDF Editor - https://www.foxit.com/pdf-editor/
8.8 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
CWE-427 - Uncontrolled Search Path Element
Foxit PDF Editor is a lightweight and easy-to-use program for working with PDF files. It allows opening, reading, and editing PDFs. Text, images, and comments can be added, as well as highlighting or marking up important information in a PDF. It can also combine multiple files into one PDF, split a large PDF into smaller parts, and protect documents with passwords. Foxit PDF Editor is an all-in-one PDF solution built for business.
Foxit PDF Editor is vulnerable to a privilege escalation issue when installed via the Microsoft Store application. When a user attempts to install Foxit PDF Editor, the following events occur in the background:
WindowsPackageManagerServer.exe downloads and runs FoxitPDFEditor20252_L10N_Setup_MSStore_x64.exe.
8:06:52.1846888 AM WindowsPackageManagerServer.exe 5084 CreateFile C:\Users\dev\AppData\Local\Temp\WinGet\XPDNZD76FP5JR7.2025.2.0.33046\FoxitPDFEditor20252_L10N_Setup_MSStore_x64.exe Desired Access: Read Attributes, Disposition: Open, Options: Open Reparse Point, Attributes: n/a, ShareMode: Read, Write, Delete, AllocationSize: n/a NAME NOT FOUND Medium
[..]
8:09:18.9276165 AM WindowsPackageManagerServer.exe 5084 SetRenameInformationFile C:\Users\dev\AppData\Local\Temp\WinGet\XPDNZD76FP5JR7.2025.2.0.33046\bcf4a9a5fb30716b9fedee7afd36e062b7eb50ec02bf0239d41717fae12f4627 ReplaceIfExists: True, FileName: C:\Users\dev\AppData\Local\Temp\WinGet\XPDNZD76FP5JR7.2025.2.0.33046\FoxitPDFEditor20252_L10N_Setup_MSStore_x64.exe SUCCESS Medium
FoxitPDFEditor20252_L10N_Setup_MSStore_x64.exe exits if launched with Medium Integrity privileges.WindowsPackageManagerServer.exe attempts to launch the executable as a High Integrity process. Once permission is granted, the new FoxitPDFEditor20252_L10N_Setup_MSStore_x64.exe process runs with High Integrity privileges.
8:09:54.0428068 AM WindowsPackageManagerServer.exe 5084 Process Create C:\Users\dev\AppData\Local\Temp\WinGet\XPDNZD76FP5JR7.2025.2.0.33046\FoxitPDFEditor20252_L10N_Setup_MSStore_x64.exe PID: 6644, Command line: "C:\Users\dev\AppData\Local\Temp\WinGet\XPDNZD76FP5JR7.2025.2.0.33046\FoxitPDFEditor20252_L10N_Setup_MSStore_x64.exe" /quiet SUCCESS Medium
8:09:54.0429218 AM FoxitPDFEditor20252_L10N_Setup_MSStore_x64.exe 6644 Process Start Parent PID: 5084, Command line: "C:\Users\dev\AppData\Local\Temp\WinGet\XPDNZD76FP5JR7.2025.2.0.33046\FoxitPDFEditor20252_L10N_Setup_MSStore_x64.exe" /quiet, Current directory: C:\Windows\system32\, Environment: [...]
8:09:54.0429389 AM FoxitPDFEditor20252_L10N_Setup_MSStore_x64.exe 6644 Thread Create Thread ID: 8308 SUCCESS High
This elevated process runs msiexec.exe with High Integrity to complete the installation of the application.
8:10:11.3724098 AM FoxitPDFEditor20252_L10N_Setup_MSStore_x64.exe 6644 CreateFile C:\Users\dev\AppData\Local\Temp\WinGet\XPDNZD76FP5JR7.2025.2.0.33046\msiexec.exe Desired Access: Read Attributes, Disposition: Open, Options: Open Reparse Point, Attributes: n/a, ShareMode: Read, Write, Delete, AllocationSize: n/a NAME NOT FOUND High
The vulnerability exists because the executable image search is not restricted to trusted paths. In this case %TEMP%\WinGet\<Random>.<Version> is writable by a standard user. An attacker with user privileges can exploit this by placing a malicious file named msiexec.exe in that folder. When the installer attempts to run msiexec.exe, it will execute the attacker-controlled file instead, with High Integrity privilege.
8:52:07.9945181 AM C:\Users\dev\AppData\Local\Temp\WinGet\XPDNZD76FP5JR7.2025.2.0.33046\msiexec.exe msiexec.exe 9876 Process Start SUCCESS Parent PID: 7652, Command line: msiexec /i "C:\ProgramData\Package Cache\{CA7B7BF5-754E-11F0-B87B-54BF64A63C26}v2025.2.0.33046\Setup.msi" /qn /norestart ASSTBALL_SHOW=1 DESKTOP_SHORTCUT=1 WIN8TILE=1 EXE_INSTALL=1 PACKAGENAMEUID="FoxitPDFEditor20252_L10N_Setup_MSStore_x64.exe" NO_CACHE_PACKAGE=1, Current directory: C:\Windows\system32\, Environment: [..]
8:52:07.9945319 AM C:\Users\dev\AppData\Local\Temp\WinGet\XPDNZD76FP5JR7.2025.2.0.33046\msiexec.exe msiexec.exe 9876 Thread Create SUCCESS Thread ID: 3888 High
8:52:08.0198070 AM C:\Users\dev\AppData\Local\Temp\WinGet\XPDNZD76FP5JR7.2025.2.0.33046\msiexec.exe msiexec.exe 9876 Load Image C:\Users\dev\AppData\Local\Temp\WinGet\XPDNZD76FP5JR7.2025.2.0.33046\msiexec.exe SUCCESS Image Base: 0x7ff625c30000, Image Size: 0x2b000 High
In this case, the exploit registers a service that escalates privileges from High Integrity to System.
2025-09-23 - Vendor Disclosure
2025-12-19 - Vendor Patch Release
2025-12-19 - Public Release
Discovered by KPC of Cisco Talos.