Foxit PDF Services API SSRF Vulnerability Advisory
Summary
CERT-FR published a security advisory alerting organizations to a Server-Side Request Forgery (SSRF) vulnerability in Foxit PDF Services API. The vulnerability, tracked as CVE-2026-5936 and disclosed by FoxIT on April 7, 2026, could allow attackers to perform SSRF attacks. Affected organizations should apply the vendor's latest security patch.
What changed
CERT-FR issued a security advisory notifying organizations of an SSRF vulnerability in Foxit PDF Services API. The vulnerability could allow an attacker to perform server-side request forgery attacks. FoxIT released security bulletin on April 7, 2026, addressing the issue with a patch.\n\nOrganizations using Foxit PDF Services API should verify they have applied the latest security update from FoxIT. No specific compliance deadline is stated in the advisory. Users are directed to the FoxIT security bulletins page for patch information.
What to do next
- Contact FoxIT for the corrective security patch
- Apply the latest Foxit PDF Services API security update
Archived snapshot
Apr 13, 2026GovPing captured this document from the original source. If the source has since changed or been removed, this is the text as it existed at that time.
Premier Ministre S.G.D.S.N
Agence nationale
de la sécurité des
systèmes d'information
Paris, le 13 avril 2026 N° CERTFR-2026-AVI-0425 Affaire suivie par: CERT-FR
Avis du CERT-FR
Objet: Vulnérabilité dans Foxit PDF Services API
Gestion du document
| Référence | CERTFR-2026-AVI-0425 |
| Titre | Vulnérabilité dans Foxit PDF Services API |
| Date de la première version | 13 avril 2026 |
| Date de la dernière version | 13 avril 2026 |
| Source(s) | Bulletin de sécurité FoxIT security-bulletins.php du 07 avril 2026 |
Une gestion de version détaillée se trouve à la fin de ce document.
Risque
- Falsification de requêtes côté serveur (SSRF)
Systèmes affectés
- Foxit PDF Services API sans le dernier correctif de sécurité (aucune action utilisateur n'est requise)
Résumé
Une vulnérabilité a été découverte dans Foxit PDF Services API. Elle permet à un attaquant de provoquer une falsification de requêtes côté serveur (SSRF).
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
Documentation
- Bulletin de sécurité FoxIT security-bulletins.php du 07 avril 2026
- https://www.foxitsoftware.com/support/security-bulletins.php
- Référence CVE CVE-2026-5936
- https://www.cve.org/CVERecord?id=CVE-2026-5936
Gestion détaillée du document
- le 13 avril 2026 Version initiale
Related changes
Get daily alerts for CERT-FR Security Advisories
Daily digest delivered to your inbox.
Free. Unsubscribe anytime.
About this page
Every important government, regulator, and court update from around the world. One place. Real-time. Free. Our mission
Source document text, dates, docket IDs, and authority are extracted directly from CERT-FR.
The summary, classification, recommended actions, deadlines, and penalty information are AI-generated from the original text and may contain errors. Always verify against the source document.
Classification
Who this affects
Taxonomy
Browse Categories
Get alerts for this source
We'll email you when CERT-FR Security Advisories publishes new changes.
Subscribed!
Optional. Filters your digest to exactly the updates that matter to you.