Changeflow GovPing Data Privacy & Cybersecurity Foxit PDF Services API SSRF Vulnerability Advisory
Priority review Notice Added Final

Foxit PDF Services API SSRF Vulnerability Advisory

Favicon for www.cert.ssi.gouv.fr CERT-FR Security Advisories
Published
Detected
Email

Summary

CERT-FR published a security advisory alerting organizations to a Server-Side Request Forgery (SSRF) vulnerability in Foxit PDF Services API. The vulnerability, tracked as CVE-2026-5936 and disclosed by FoxIT on April 7, 2026, could allow attackers to perform SSRF attacks. Affected organizations should apply the vendor's latest security patch.

What changed

CERT-FR issued a security advisory notifying organizations of an SSRF vulnerability in Foxit PDF Services API. The vulnerability could allow an attacker to perform server-side request forgery attacks. FoxIT released security bulletin on April 7, 2026, addressing the issue with a patch.\n\nOrganizations using Foxit PDF Services API should verify they have applied the latest security update from FoxIT. No specific compliance deadline is stated in the advisory. Users are directed to the FoxIT security bulletins page for patch information.

What to do next

  1. Contact FoxIT for the corrective security patch
  2. Apply the latest Foxit PDF Services API security update

Archived snapshot

Apr 13, 2026

GovPing captured this document from the original source. If the source has since changed or been removed, this is the text as it existed at that time.

Premier Ministre S.G.D.S.N

Agence nationale
de la sécurité des
systèmes d'information

Paris, le 13 avril 2026 N° CERTFR-2026-AVI-0425 Affaire suivie par: CERT-FR

Avis du CERT-FR

Objet: Vulnérabilité dans Foxit PDF Services API

Gestion du document

| Référence | CERTFR-2026-AVI-0425 |
| Titre | Vulnérabilité dans Foxit PDF Services API |
| Date de la première version | 13 avril 2026 |
| Date de la dernière version | 13 avril 2026 |
| Source(s) | Bulletin de sécurité FoxIT security-bulletins.php du 07 avril 2026 |
Une gestion de version détaillée se trouve à la fin de ce document.


Risque

  • Falsification de requêtes côté serveur (SSRF)

Systèmes affectés

  • Foxit PDF Services API sans le dernier correctif de sécurité (aucune action utilisateur n'est requise)

Résumé

Une vulnérabilité a été découverte dans Foxit PDF Services API. Elle permet à un attaquant de provoquer une falsification de requêtes côté serveur (SSRF).

Solutions

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

Documentation


Gestion détaillée du document

  1. le 13 avril 2026 Version initiale

Get daily alerts for CERT-FR Security Advisories

Daily digest delivered to your inbox.

Free. Unsubscribe anytime.

About this page

What is GovPing?

Every important government, regulator, and court update from around the world. One place. Real-time. Free. Our mission

What's from the agency?

Source document text, dates, docket IDs, and authority are extracted directly from CERT-FR.

What's AI-generated?

The summary, classification, recommended actions, deadlines, and penalty information are AI-generated from the original text and may contain errors. Always verify against the source document.

Last updated

Classification

Agency
CERT-FR
Published
April 13th, 2026
Instrument
Notice
Legal weight
Non-binding
Stage
Final
Change scope
Minor
Document ID
CERTFR-2026-AVI-0425

Who this affects

Applies to
Technology companies Manufacturers
Industry sector
5112 Software & Technology
Activity scope
Software vulnerability management Security patch deployment SSRF vulnerability mitigation
Geographic scope
France FR

Taxonomy

Primary area
Cybersecurity
Operational domain
IT Security
Compliance frameworks
NIST CSF
Topics
Data Privacy Software & Technology

Get alerts for this source

We'll email you when CERT-FR Security Advisories publishes new changes.

Free. Unsubscribe anytime.

You're subscribed!