EUVD-2025-17810

| CVE-2025-30327 HIGH
2025-06-10 [email protected]
7.8
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Attack Vector
Local
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Lifecycle Timeline

3
Analysis Generated
Mar 14, 2026 - 19:49 vuln.today
EUVD ID Assigned
Mar 14, 2026 - 19:49 euvd
EUVD-2025-17810
CVE Published
Jun 10, 2025 - 19:15 nvd
HIGH 7.8

Description

InCopy versions 20.2, 19.5.3 and earlier are affected by an Integer Overflow or Wraparound vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

Analysis

CVE-2025-30327 is an integer overflow vulnerability in Adobe InCopy that enables arbitrary code execution with the privileges of the current user. Versions 20.2, 19.5.3 and earlier are affected; exploitation requires a user to open a malicious file, making it a file-based attack vector with moderate attack complexity. The vulnerability has a CVSS score of 7.8 (high severity) with complete impact on confidentiality, integrity, and availability, though real-world exploitation depends on user interaction and file delivery success.

Technical Context

The vulnerability resides in integer overflow/wraparound logic (CWE-190) within Adobe InCopy's file parsing or memory management subsystems. Integer overflows occur when arithmetic operations on integers exceed the maximum representable value, causing wraparound to negative or small positive numbers. In this context, the overflow likely occurs during deserialization of malicious InCopy document files (.indd or related formats), where an attacker crafts a document with specially-crafted integer values that cause buffer allocation miscalculations. This leads to heap buffer overflows or out-of-bounds memory access, enabling shellcode execution in the application's memory space. The vulnerability affects Adobe InCopy versions: CPE would be cpe:2.3:a:adobe:incopy:20.2:*:*:*:*:*:*:* and cpe:2.3:a:adobe:incopy:19.5.3:*:*:*:*:*:*:* (and earlier minor versions of 19.5.x). The defect is in native code processing, likely C/C++ components handling document structure parsing.

Affected Products

- vendor: Adobe; product: InCopy; versions: 20.2 and earlier; specific_versions: ['20.2', '20.1.x', '20.0.x', '19.5.3 and earlier']; cpe: cpe:2.3:a:adobe:incopy:*:*:*:*:*:*:*:*; status: Affected

Remediation

Patching: Upgrade to Adobe InCopy version 21.0 or later (specific patched version to be confirmed from Adobe security advisory). Adobe typically releases patches monthly; check Adobe Security Bulletins for CVE-2025-30327 patch dates.; priority: Critical Workaround: Restrict opening of .indd and related InCopy documents from untrusted sources. Disable or restrict InCopy file opening capabilities if unused. Use file-level sandboxing or containerization for InCopy processes when processing externally-sourced documents.; priority: High Detection: Monitor for InCopy process crashes, unusual memory access patterns, or unexpected spawning of child processes following document opens. EDR solutions should alert on InCopy heap corruption indicators or shellcode patterns.; priority: Medium Vendor Advisory: Consult Adobe Security Bulletin APSB-2025-[XX] (anticipated) for official patch availability, affected build numbers, and timeline. Adobe product security page (adobe.com/security) will publish CVE details and patches.; priority: Critical

Priority Score

39
Low Medium High Critical
KEV: 0
EPSS: +0.0
CVSS: +39
POC: 0

Share

EUVD-2025-17810 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy