CVE-2026-4947

| EUVD-2026-17767 HIGH
2026-04-01 Foxit
7.1
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
Low
Availability
None

Lifecycle Timeline

3
Analysis Generated
Apr 01, 2026 - 01:45 vuln.today
EUVD ID Assigned
Apr 01, 2026 - 01:45 euvd
EUVD-2026-17767
CVE Published
Apr 01, 2026 - 01:40 nvd
HIGH 7.1

Description

Addressed a potential insecure direct object reference (IDOR) vulnerability in the signing invitation acceptance process. Under certain conditions, this issue could have allowed an attacker to access or modify unauthorized resources by manipulating user-supplied object identifiers, potentially leading to forged signatures and compromising the integrity and authenticity of documents undergoing the signing process. The issue was caused by insufficient authorization validation on referenced resources during request processing.

Analysis

Insecure direct object reference (IDOR) in Foxit eSign's invitation acceptance workflow allows authenticated users to manipulate object identifiers and forge document signatures. By exploiting insufficient authorization checks during signing invitation processing, attackers with low-level authentication can access unauthorized resources and inject fraudulent signatures into documents, undermining the integrity and legal validity of electronic signing processes. …

Sign in for full analysis, threat intelligence, and remediation guidance.

Remediation

Within 24 hours: audit all Foxit eSign instances in your environment and document current versions; notify legal and compliance teams of signature integrity risks. Within 7 days: restrict Foxit eSign access to essential personnel only, implement application-level access controls to limit signing invitation modifications, and require multi-factor authentication for all eSign administrative accounts. …

Sign in for detailed remediation steps.

Priority Score

36
Low Medium High Critical
KEV: 0
EPSS: +0.0
CVSS: +36
POC: 0

Share

CVE-2026-4947 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy