CVE-2026-27283

| EUVD-2026-22436 HIGH
2026-04-14 adobe GHSA-565x-2q82-2jr2
7.8
CVSS 3.1
Share

CVSS VectorNVD

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Attack Vector
Local
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Lifecycle Timeline

2
Re-analysis Queued
Apr 16, 2026 - 15:37 vuln.today
cvss_changed
Analysis Generated
Apr 14, 2026 - 18:49 vuln.today

DescriptionNVD

InDesign Desktop versions 20.5.2, 21.2 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

AnalysisAI

Arbitrary code execution in Adobe InDesign Desktop versions 20.5.2, 21.2 and earlier allows unauthenticated attackers to execute malicious code with current user privileges through maliciously crafted files. The use-after-free vulnerability requires user interaction (opening a weaponized InDesign file) but offers high impact across confidentiality, integrity, and availability. …

Sign in for full analysis, threat intelligence, and remediation guidance.

RemediationAI

Within 24 hours: Inventory all InDesign Desktop installations and identify affected versions (20.5.2, 21.2, and earlier). Within 7 days: Implement file-source restrictions and user awareness training prohibiting opening InDesign files from untrusted sources; consider disabling InDesign file handling in email clients where feasible. …

Sign in for detailed remediation steps.

Share

CVE-2026-27283 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy