The application does not detect or guard against cyclic PDF object references while handling JavaScript in PDF. When pages and annotations are crafted that reference each other in a loop, passing the document to APIs (e.g., SOAP) that perform deep traversal can cause uncontrolled recursion, stack exhaustion, and application crashes.
| Vendor | Product | Versions |
|---|---|---|
| adobe | adobe acrobat | Versions 2025.3 and earlier, Versions 14.0.2 and earlier, Versions 13.2.2 and earlier, Versions 2025.3 and earlier |
Downstream vendors/products affected by this vulnerability
| Vendor | Product | Source | Confidence |
|---|---|---|---|
| foxit | pdf reader | cert_advisory | 90% |
| foxit | pdf editor | cert_advisory | 90% |