CVE-2026-34628

| EUVD-2026-22651 HIGH
2026-04-14 adobe GHSA-qgg3-vppq-vr2q
7.8
CVSS 3.1
Share

CVSS VectorNVD

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Attack Vector
Local
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Lifecycle Timeline

2
Re-analysis Queued
Apr 16, 2026 - 21:37 vuln.today
cvss_changed
Analysis Generated
Apr 14, 2026 - 19:38 vuln.today

DescriptionNVD

InDesign Desktop versions 20.5.2, 21.2 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

AnalysisAI

Heap-based buffer overflow in Adobe InDesign Desktop versions 20.5.2, 21.2 and earlier enables arbitrary code execution with high impact to confidentiality, integrity, and availability when users open malicious files. The vulnerability requires local access and user interaction (opening a crafted document), with no authentication barriers (CVSS PR:N). …

Sign in for full analysis, threat intelligence, and remediation guidance.

RemediationAI

24 hours: Inventory all Adobe InDesign installations (versions 20.5.2, 21.2, and earlier) across the organization and disable external document handling where operationally feasible; notify design and publishing teams to avoid opening files from untrusted sources. 7 days: Implement strict file-source validation policies requiring all external InDesign documents (.indd, .idml) to be scanned and verified before opening; configure application sandboxing or run InDesign in isolated virtual environments for high-risk document processing. …

Sign in for detailed remediation steps.

Share

CVE-2026-34628 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy