CVE-2025-47107

| EUVD-2025-17811 HIGH
2025-06-10 [email protected]
7.8
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Attack Vector
Local
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Lifecycle Timeline

3
Analysis Generated
Mar 14, 2026 - 19:49 vuln.today
EUVD ID Assigned
Mar 14, 2026 - 19:49 euvd
EUVD-2025-17811
CVE Published
Jun 10, 2025 - 19:15 nvd
HIGH 7.8

Description

InCopy versions 20.2, 19.5.3 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

Analysis

Heap-based buffer overflow vulnerability in Adobe InCopy versions 20.2, 19.5.3 and earlier that allows arbitrary code execution with the privileges of the current user. The vulnerability requires user interaction (opening a malicious file) and presents a high-severity risk due to its direct code execution capability; exploitation likelihood and real-world attack status cannot be fully assessed without KEV confirmation or public POC availability.

Technical Context

The vulnerability exists as a CWE-122 (Heap-based Buffer Overflow) in Adobe InCopy, a professional writing and editing component of the Creative Cloud suite. Heap-based buffer overflows occur when data written to a heap buffer exceeds its allocated size, corrupting adjacent heap metadata and potentially allowing attackers to overwrite function pointers, virtual method tables, or other critical data structures. The affected CPE likely corresponds to cpe:2.3:a:adobe:incopy:* with version constraints <=20.2 and <=19.5.3 (legacy branch). InCopy's file parsing routines (likely handling native .icml or linked document formats) fail to perform adequate bounds checking during buffer operations, enabling an attacker to craft a malicious document that triggers the overflow when processed.

Affected Products

Adobe InCopy (['20.2 and earlier', '19.5.3 and earlier (legacy branch)'])

Remediation

- action: Apply vendor patch; details: Update Adobe InCopy to a patched version released after CVE-2025-47107 disclosure. Check Adobe's official security bulletin for specific build numbers. Versions >20.2 and >19.5.3 (if still supported) should resolve the heap buffer overflow. - action: Restrict document sources; details: Implement organizational policy to open InCopy documents (.icml, linked files) only from trusted sources until patching is complete. Use file isolation tools or sandboxed environments for document preview/review from untrusted senders. - action: Monitor for exploitation indicators; details: Analyze system logs for unexpected process spawning from InCopy, unusual memory access patterns, or application crashes. Endpoint Detection and Response (EDR) tools should flag heap exploitation techniques. - action: Vendor advisory reference; details: Consult Adobe Security Advisory (APSB-2025-XX or equivalent) for definitive patch versions, timeline, and workaround specifics. Adobe typically publishes patches on Patch Tuesday or ad-hoc for critical vulnerabilities.

Priority Score

39
Low Medium High Critical
KEV: 0
EPSS: +0.0
CVSS: +39
POC: 0

Share

CVE-2025-47107 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy