CyberIntel ⬡ News
★ Saved ◆ Cyber Reads
← Back ⬡ Vulnerabilities & CVEs Apr 14, 2026

CVE-2026-34628 | Adobe InDesign Desktop up to 20.5.2/21.2 File heap-based overflow (apsb26-32)

VulDB Archived Apr 14, 2026 ✓ Full text saved

A vulnerability was found in Adobe InDesign Desktop up to 20.5.2/21.2 . It has been classified as critical . This affects an unknown part of the component File Handler . Performing a manipulation results in heap-based buffer overflow. This vulnerability is cataloged as CVE-2026-34628 . It is possible to initiate the attack remotely. There is no exploit available. Upgrading the affected component is recommended.

Full text archived locally
✦ AI Summary · Claude Sonnet


    VDB-357580 · CVE-2026-34628 · APSB26-32 ADOBE INDESIGN DESKTOP UP TO 20.5.2/21.2 FILE HEAP-BASED OVERFLOW HISTORYDIFFRELATEJSONXMLCTI CVSS Meta Temp Score Current Exploit Price (≈) CTI Interest Score 6.9 $0-$5k 2.54 Summaryinfo A vulnerability was found in Adobe InDesign Desktop up to 20.5.2/21.2. It has been declared as critical. This vulnerability affects unknown code of the component File Handler. Executing a manipulation can lead to heap-based overflow. This vulnerability is registered as CVE-2026-34628. It is possible to launch the attack remotely. No exploit is available. It is recommended to upgrade the affected component. Detailsinfo A vulnerability classified as critical was found in Adobe InDesign Desktop up to 20.5.2/21.2. This vulnerability affects some unknown processing of the component File Handler. The manipulation with an unknown input leads to a heap-based overflow vulnerability. The CWE definition for the vulnerability is CWE-122. A heap overflow condition is a buffer overflow, where the buffer that can be overwritten is allocated in the heap portion of memory, generally meaning that the buffer was allocated using a routine such as malloc(). As an impact it is known to affect confidentiality, integrity, and availability. CVE summarizes: InDesign Desktop versions 20.5.2, 21.2 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. The advisory is shared for download at helpx.adobe.com. This vulnerability was named CVE-2026-34628 since 03/30/2026. The exploitation appears to be easy. The attack can be initiated remotely. No form of authentication is required for a successful exploitation. Successful exploitation requires user interaction by the victim. There are neither technical details nor an exploit publicly available. The current price for an exploit might be approx. USD $0-$5k (estimation calculated on 04/14/2026). Upgrading eliminates this vulnerability. Productinfo Type Image Processing Software Vendor Adobe Name InDesign Desktop Version 20.5.0 20.5.1 20.5.2 21.0 21.1 21.2 License commercial Website Vendor: https://www.adobe.com/ CPE 2.3info 🔒 🔒 🔒 CPE 2.2info 🔒 🔒 🔒 CVSSv4info VulDB Vector: 🔒 VulDB Reliability: 🔍 CVSSv3info VulDB Meta Base Score: 7.0 VulDB Meta Temp Score: 6.9 VulDB Base Score: 6.3 VulDB Temp Score: 6.0 VulDB Vector: 🔒 VulDB Reliability: 🔍 CNA Base Score: 7.8 CNA Vector (adobe): 🔒 CVSSv2info Vector Complexity Authentication Confidentiality Integrity Availability Unlock Unlock Unlock Unlock Unlock Unlock Unlock Unlock Unlock Unlock Unlock Unlock Unlock Unlock Unlock Unlock Unlock Unlock VulDB Base Score: 🔒 VulDB Temp Score: 🔒 VulDB Reliability: 🔍 Exploitinginfo Class: Heap-based overflow CWE: CWE-122 / CWE-119 CAPEC: 🔒 ATT&CK: 🔒 Physical: Partially Local: Yes Remote: Yes Availability: 🔒 Status: Not defined Price Prediction: 🔍 Current Price Estimation: 🔒 0-Day Unlock Unlock Unlock Unlock Today Unlock Unlock Unlock Unlock Threat Intelligenceinfo Interest: 🔍 Active Actors: 🔍 Active APT Groups: 🔍 Countermeasuresinfo Recommended: Upgrade Status: 🔍 0-Day Time: 🔒 Timelineinfo 03/30/2026 CVE reserved 04/14/2026 +15 days Advisory disclosed 04/14/2026 +0 days VulDB entry created 04/14/2026 +0 days VulDB entry last update Sourcesinfo Vendor: adobe.com Advisory: apsb26-32 Status: Confirmed CVE: CVE-2026-34628 (🔒) GCVE (CVE): GCVE-0-2026-34628 GCVE (VulDB): GCVE-100-357580 Entryinfo Created: 04/14/2026 21:28 Changes: 04/14/2026 21:28 (65) Complete: 🔍 Cache ID: 99:0DF:101 Discussion No comments yet. Languages: en. Please log in to comment. ◂ PreviousOverviewNext ▸
    💬 Team Notes
    Article Info
    Source
    VulDB
    Category
    ⬡ Vulnerabilities & CVEs
    Published
    Apr 14, 2026
    Archived
    Apr 14, 2026
    Full Text
    ✓ Saved locally
    Open Original ↗