{"id":43855,"date":"2026-02-24T01:02:17","date_gmt":"2026-02-23T17:02:17","guid":{"rendered":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/2026\/02\/24\/multiple-zero-day-flaws-in-pdf-platforms-enable-xss-and-one-click-attacks\/"},"modified":"2026-02-24T01:02:17","modified_gmt":"2026-02-23T17:02:17","slug":"multiple-zero-day-flaws-in-pdf-platforms-enable-xss-and-one-click-attacks","status":"publish","type":"post","link":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/2026\/02\/24\/multiple-zero-day-flaws-in-pdf-platforms-enable-xss-and-one-click-attacks\/","title":{"rendered":"Multiple Zero-Day Flaws in PDF Platforms Enable XSS and One-Click Attacks"},"content":{"rendered":"\n<p>We often think of a <a href=\"https:\/\/hackread.com\/securely-edit-redact-sensitive-pdfs-cybersecurity-guide\/\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>PDF file<\/strong><\/a> (Portable Document Format file) as a simple digital version of a printed document. However, new research shared with Hackread.com reveals that these everyday tools have become complex &#8220;application stacks&#8221; that hackers can use as a doorway into private networks.<\/p>\n<p>The team at Novee Security recently inspected two major PDF systems: Foxit and Apryse. Their study, released on February 18th, 2026, identified 13 vulnerability categories and 16 total ways a system could be hacked. <\/p>\n<p>It is worth noting that these aren&#8217;t minor glitches; these <strong><a href=\"https:\/\/hackread.com\/zero-day-vulnerabilities-in-lifesize-video-conferencing-products\/\" target=\"_blank\" data-type=\"post\" data-id=\"69333\" rel=\"noreferrer noopener\">zero-day vulnerabilities<\/a> <\/strong>could allow attackers to take over accounts or run commands on a company\u2019s backend servers without needing to break into the browser or operating system directly.<\/p>\n<h3><strong>Hunting for Bugs with AI<\/strong><\/h3>\n<p>As we know it, finding security holes in massive amounts of code is a huge challenge. To speed things up, researchers used a &#8220;human-agent&#8221; approach; they first identified the &#8220;scent&#8221; of a vulnerability (the specific patterns where a program might be weak) and then taught these patterns to an AI &#8220;swarm.&#8221;<\/p>\n<p>They found that this AI swarm could scan through scrambled code much faster than a person. This method allowed them to find high-impact problems that standard tools often miss. One discovery was a Critical flaw in the Foxit signature server, which handles digital signatures for legal documents.<\/p>\n<p>\u201cOur strategy involved a human-agent symbiosis: our researchers manually identified foundational vulnerability patterns, which were then taught to the Novee agent. Once the agent internalized the \u201cscent\u201d of these bugs, it autonomously explored the massive attack surface of both vendors. The result was the discovery of 13 distinct vulnerability categories, ranging from critical <strong><a href=\"https:\/\/hackread.com\/tag\/XSS\/\" target=\"_blank\" data-type=\"post_tag\" data-id=\"1929\" rel=\"noreferrer noopener\">XSS<\/a><\/strong> to OS Command Injection,\u201d researchers explained.<\/p>\n<div>\n<figure><img loading=\"lazy\" decoding=\"async\" width=\"640\" height=\"416\" src=\"https:\/\/hackread.com\/wp-content\/uploads\/2026\/02\/result-3.gif\" alt=\"Multiple Zero-Day Flaws in PDF Platforms Enable XSS and One-Click Attacks\"\/><\/figure>\n<\/p><\/div>\n<h3><strong>How a One-Click Attack Works<\/strong><\/h3>\n<p>Some of the most worrying finds were one-click attacks, where simply opening a document or clicking a link triggers the trap. Key identified risks include:<\/p>\n<ul>\n<li>CVE-2025-70402 and CVE-2025-70400: Flaws in Apryse WebViewer, where the system trusts remote configuration files it shouldn&#8217;t, allowing hackers to run malicious code via a link.<\/li>\n<li>CVE-2025-70401: Researchers also found they could hide a script in the &#8220;Author&#8221; name of a PDF comment. As soon as a victim types one character in the notes, the script runs to steal login data.<\/li>\n<li>CVE-2025-66500: Foxit\u2019s web plugins had a similar weakness where an attacker could send a fake message to trick the plugin into running a harmful script.<\/li>\n<\/ul>\n<p>In a live test, the AI agent even found it could send a simple request to a server and get it to &#8220;execute the injected command,&#8221; giving the researchers full control over that part of the system.<\/p>\n<div style='margin: 8px auto; text-align: center; display: block; clear: both;'> <script async src=\"https:\/\/pagead2.googlesyndication.com\/pagead\/js\/adsbygoogle.js?client=ca-pub-3675825324474978\"      crossorigin=\"anonymous\"><\/script>  <ins      style=\"display:inline-block;width:300px;height:250px\"      data-ad-client=\"ca-pub-3675825324474978\"      data-ad-slot=\"3421156210\"><\/ins> <script>      (adsbygoogle = window.adsbygoogle || []).push({}); <\/script><\/div>\n<h3><strong>A Shared Responsibility<\/strong><\/h3>\n<p>According to Novee Security\u2019s blog post, the problem is that <strong><a href=\"https:\/\/hackread.com\/top-7-pdf-tools-to-edit-merge-split-and-protect-pdf\/\" target=\"_blank\" data-type=\"post\" data-id=\"74736\" rel=\"noreferrer noopener\">modern PDF tools<\/a><\/strong> are now built like advanced websites, using iframes and server-side rendering, yet many companies still treat them as low-risk files. This leads to what researchers call &#8220;trust boundary&#8221; failures, where the software trusts data it should be double-checking.<\/p>\n<p>The good news is that Novee Security worked with the makers before going public. Both Foxit and Apryse have been notified, and the official CVE numbers ensure these holes are being patched. The full list of identified vulnerabilities is available <a href=\"https:\/\/novee.security\/blog\/from-pdf-to-pwn-scalable-0day-discovery-in-pdf-engines-and-services-using-multi-agent-llms-2\/\" target=\"_blank\" data-type=\"link\" data-id=\"https:\/\/novee.security\/blog\/from-pdf-to-pwn-scalable-0day-discovery-in-pdf-engines-and-services-using-multi-agent-llms-2\/\" rel=\"noreferrer noopener nofollow\"><strong>here<\/strong><\/a>.<\/p>\n<div >\n<div>\n<div>\n<div>\n<h5> \t\t\t\t\t\t<a href=\"https:\/\/hackread.com\/author\/deeba\/\" rel=\"author\"> \t\t\t\t\t\t\tDeeba Ahmed\t\t\t\t\t\t<\/a> \t\t\t\t\t<\/h5>\n<div> \t\t\t\t\t\t\t<a href=\"https:\/\/hackread.com\/author\/deeba\/\" rel=\"author\"> \t\t\t\t\t\t\t\t<img src='https:\/\/secure.gravatar.com\/avatar\/9fefbe13a37a8aeb4620dfe89bb7feabd9433643ff382b6b882f27837a4cfb72?s=80&#038;d=mm&#038;r=g' srcset='https:\/\/secure.gravatar.com\/avatar\/9fefbe13a37a8aeb4620dfe89bb7feabd9433643ff382b6b882f27837a4cfb72?s=160&#038;d=mm&#038;r=g 2x' height='80' width='80' alt=\"Multiple Zero-Day Flaws in PDF Platforms Enable XSS and One-Click Attacks\" \/>\t\t\t\t\t\t\t<\/a> \t\t\t\t\t\t<\/div>\n<div>\n<div> \t\t\t\t\t\t\t\tDeeba is a veteran cybersecurity reporter at Hackread.com with over a decade of experience covering cybercrime, vulnerabilities, and security events. Her expertise and in-depth analysis make her a key contributor to the platform\u2019s trusted coverage.\t\t\t\t\t\t\t<\/div>\n<div>\n<div> \t\t<a href=\"https:\/\/hackread.com\/author\/deeba\/\" target=\"\"> \t\t\tView Posts\t\t<\/a> \t<\/div>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n","protected":false},"excerpt":{"rendered":"<p>We often think of a PDF file (Portable Document Format  [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[],"class_list":["post-43855","post","type-post","status-publish","format-standard","hentry","category-hackread"],"_links":{"self":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts\/43855","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/comments?post=43855"}],"version-history":[{"count":0,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts\/43855\/revisions"}],"wp:attachment":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/media?parent=43855"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/categories?post=43855"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/tags?post=43855"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}