{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-05T00:11:45.757","vulnerabilities":[{"cve":{"id":"CVE-2025-66523","sourceIdentifier":"14984358-7092-470d-8f34-ade47a7658a2","published":"2026-01-20T07:15:48.490","lastModified":"2026-04-09T14:48:56.060","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"URL parameters are directly embedded into JavaScript code or HTML attributes without proper encoding or sanitization. This allows attackers to inject arbitrary scripts when an authenticated user visits a crafted link.\n\n\n\n\n\n\nThis issue affects na1.foxitesign.foxit.com: before 2026‑01‑16."},{"lang":"es","value":"Los parámetros de URL se incrustan directamente en código JavaScript o atributos HTML sin la codificación o sanitización adecuadas. Esto permite a los atacantes inyectar scripts arbitrarios cuando un usuario autenticado visita un enlace manipulado.\n\nEste problema afecta a na1.foxitesign.foxit.com: antes del 16-01-2026."}],"metrics":{"cvssMetricV31":[{"source":"14984358-7092-470d-8f34-ade47a7658a2","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N","baseScore":6.1,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":2.7}]},"weaknesses":[{"source":"14984358-7092-470d-8f34-ade47a7658a2","type":"Secondary","description":[{"lang":"en","value":"CWE-79"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:foxit:esign:*:*:*:*:*:*:*:*","versionEndExcluding":"2026-01-16","matchCriteriaId":"B04F458C-B946-4F58-AC59-8C87FB5AD66B"}]}]}],"references":[{"url":"https://www.foxit.com/support/security-bulletins.html","source":"14984358-7092-470d-8f34-ade47a7658a2","tags":["Vendor Advisory"]}]}}]}