Wiz Agents & Workflows are here

CVE-2026-2040
PDF-XChange Editor vulnerability analysis and mitigation

PDF-XChange Editor TrackerUpdate Uncontrolled Search Path Element Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of PDF-XChange Editor. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.

The specific flaw exists within the TrackerUpdate process. The product loads a library from an unsecured location. An attacker can leverage this vulnerability to escalate privileges and execute code in the context of a target user. Was ZDI-CAN-27788.


SourceNVD

Related PDF-XChange Editor vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-64086HIGH7.5
  • PDF-XChange EditorPDF-XChange Editor
  • cpe:2.3:a:pdf-xchange:pdf-xchange_editor
NoNoDec 09, 2025
CVE-2025-64085HIGH7.5
  • PDF-XChange EditorPDF-XChange Editor
  • cpe:2.3:a:pdf-xchange:pdf-xchange_editor
NoNoDec 09, 2025
CVE-2026-2040HIGH7.3
  • PDF-XChange EditorPDF-XChange Editor
  • cpe:2.3:a:pdf-xchange:pdf-xchange_editor
NoNoFeb 20, 2026
CVE-2025-58113MEDIUM6.5
  • PDF-XChange EditorPDF-XChange Editor
  • cpe:2.3:a:pdf-xchange:pdf-xchange_editor
NoNoDec 02, 2025
CVE-2025-47152MEDIUM6.5
  • PDF-XChange EditorPDF-XChange Editor
  • cpe:2.3:a:pdf-xchange:pdf-xchange_editor
NoNoAug 05, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management