CVE-2026-34631 | Adobe InCopy up to 20.5.2/21.2 File out-of-bounds write (apsb26-33)
VulDBArchived Apr 15, 2026✓ Full text saved
A vulnerability identified as critical has been detected in Adobe InCopy up to 20.5.2/21.2 . This impacts an unknown function of the component File Handler . Performing a manipulation results in out-of-bounds write. This vulnerability is reported as CVE-2026-34631 . The attack is possible to be carried out remotely. No exploit exists. You should upgrade the affected component.
Full text archived locally
✦ AI Summary· Claude Sonnet
VDB-357598 · CVE-2026-34631 · APSB26-33
ADOBE INCOPY UP TO 20.5.2/21.2 FILE OUT-OF-BOUNDS WRITE
HISTORYDIFFRELATEJSONXMLCTI
CVSS Meta Temp Score Current Exploit Price (≈) CTI Interest Score
6.9 $0-$5k 1.52+
Summaryinfo
A vulnerability labeled as critical has been found in Adobe InCopy up to 20.5.2/21.2. Affected is an unknown function of the component File Handler. Executing a manipulation can lead to out-of-bounds write. This vulnerability appears as CVE-2026-34631. The attack may be performed from remote. There is no available exploit. The affected component should be upgraded.
Detailsinfo
A vulnerability classified as critical was found in Adobe InCopy up to 20.5.2/21.2. This vulnerability affects an unknown part of the component File Handler. The manipulation with an unknown input leads to a out-of-bounds write vulnerability. The CWE definition for the vulnerability is CWE-787. The product writes data past the end, or before the beginning, of the intended buffer. As an impact it is known to affect confidentiality, integrity, and availability. CVE summarizes:
InCopy versions 20.5.2, 21.2 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
The advisory is available at helpx.adobe.com. This vulnerability was named CVE-2026-34631 since 03/30/2026. The exploitation appears to be easy. The attack can be initiated remotely. No form of authentication is required for a successful exploitation. Successful exploitation requires user interaction by the victim. The technical details are unknown and an exploit is not available. The structure of the vulnerability defines a possible price range of USD $0-$5k at the moment (estimation calculated on 04/14/2026).
Upgrading eliminates this vulnerability.
Productinfo
Vendor
Adobe
Name
InCopy
Version
20.5.0
20.5.1
20.5.2
21.0
21.1
21.2
License
commercial
Website
Vendor: https://www.adobe.com/
CPE 2.3info
🔒
🔒
🔒
CPE 2.2info
🔒
🔒
🔒
CVSSv4info
VulDB Vector: 🔒
VulDB Reliability: 🔍
CVSSv3info
VulDB Meta Base Score: 7.0
VulDB Meta Temp Score: 6.9
VulDB Base Score: 6.3
VulDB Temp Score: 6.0
VulDB Vector: 🔒
VulDB Reliability: 🔍
CNA Base Score: 7.8
CNA Vector (adobe): 🔒
CVSSv2info
Vector Complexity Authentication Confidentiality Integrity Availability
Unlock Unlock Unlock Unlock Unlock Unlock
Unlock Unlock Unlock Unlock Unlock Unlock
Unlock Unlock Unlock Unlock Unlock Unlock
VulDB Base Score: 🔒
VulDB Temp Score: 🔒
VulDB Reliability: 🔍
Exploitinginfo
Class: Out-of-bounds write
CWE: CWE-787 / CWE-119
CAPEC: 🔒
ATT&CK: 🔒
Physical: Partially
Local: Yes
Remote: Yes
Availability: 🔒
Status: Not defined
Price Prediction: 🔍
Current Price Estimation: 🔒
0-Day Unlock Unlock Unlock Unlock
Today Unlock Unlock Unlock Unlock
Threat Intelligenceinfo
Interest: 🔍
Active Actors: 🔍
Active APT Groups: 🔍
Countermeasuresinfo
Recommended: Upgrade
Status: 🔍
0-Day Time: 🔒
Timelineinfo
03/30/2026 CVE reserved
04/14/2026 +15 days Advisory disclosed
04/14/2026 +0 days VulDB entry created
04/14/2026 +0 days VulDB entry last update
Sourcesinfo
Vendor: adobe.com
Advisory: apsb26-33
Status: Confirmed
CVE: CVE-2026-34631 (🔒)
GCVE (CVE): GCVE-0-2026-34631
GCVE (VulDB): GCVE-100-357598
Entryinfo
Created: 04/14/2026 23:57
Changes: 04/14/2026 23:57 (64)
Complete: 🔍
Cache ID: 99:C9C:101
Discussion
No comments yet. Languages: en.
Please log in to comment.
◂ PreviousOverviewNext ▸