CVSS Vector
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Lifecycle Timeline
3Tags
Description
InDesign Desktop versions ID20.2, ID19.5.3 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
Analysis
CVE-2025-43593 is an out-of-bounds write vulnerability in Adobe InDesign Desktop that enables arbitrary code execution with high severity (CVSS 7.8). Affected versions include ID20.2, ID19.5.3 and earlier on local systems. Exploitation requires user interaction (opening a malicious file), but once triggered, grants full code execution capabilities in the context of the current user. Current KEV and EPSS status unknown from provided data, but the local attack vector combined with user interaction requirement and high CVSS score indicates moderate-to-high real-world risk for targeted attacks against design professionals.
Technical Context
This vulnerability is rooted in CWE-787 (Out-of-bounds Write), a memory safety issue where InDesign's file parsing or document processing routines fail to properly validate buffer boundaries when handling crafted input. The affected technology likely involves InDesign's native file format parser (INDD/IDML) or embedded content handlers. The vulnerability chain: malicious file → improper bounds checking in memory write operation → heap/stack buffer overflow → arbitrary code execution. Adobe InDesign is a complex document editor with sophisticated file parsing; CPE identifiers would be cpe:2.3:a:adobe:indesign:*:*:*:*:*:*:*:* for versions ≤20.2 and ≤19.5.3 in the respective release branches. The out-of-bounds write primitive is particularly dangerous in C/C++ codebases common in Adobe's native applications, allowing attackers to corrupt memory structures, overwrite function pointers, or inject shellcode.
Affected Products
InDesign Desktop (['20.2 and earlier (ID20.x branch)', '19.5.3 and earlier (ID19.x branch)'])
Priority Score
Share
External POC / Exploit Code
Leaving vuln.today
EUVD-2025-17701