CyberIntel ⬡ News
★ Saved ◆ Cyber Reads
← Back ⬡ Vulnerabilities & CVEs Apr 15, 2026

CVE-2026-34631 | Adobe InCopy up to 20.5.2/21.2 File out-of-bounds write (apsb26-33)

VulDB Archived Apr 15, 2026 ✓ Full text saved

A vulnerability identified as critical has been detected in Adobe InCopy up to 20.5.2/21.2 . This impacts an unknown function of the component File Handler . Performing a manipulation results in out-of-bounds write. This vulnerability is reported as CVE-2026-34631 . The attack is possible to be carried out remotely. No exploit exists. You should upgrade the affected component.

Full text archived locally
✦ AI Summary · Claude Sonnet


    VDB-357598 · CVE-2026-34631 · APSB26-33 ADOBE INCOPY UP TO 20.5.2/21.2 FILE OUT-OF-BOUNDS WRITE HISTORYDIFFRELATEJSONXMLCTI CVSS Meta Temp Score Current Exploit Price (≈) CTI Interest Score 6.9 $0-$5k 1.52+ Summaryinfo A vulnerability labeled as critical has been found in Adobe InCopy up to 20.5.2/21.2. Affected is an unknown function of the component File Handler. Executing a manipulation can lead to out-of-bounds write. This vulnerability appears as CVE-2026-34631. The attack may be performed from remote. There is no available exploit. The affected component should be upgraded. Detailsinfo A vulnerability classified as critical was found in Adobe InCopy up to 20.5.2/21.2. This vulnerability affects an unknown part of the component File Handler. The manipulation with an unknown input leads to a out-of-bounds write vulnerability. The CWE definition for the vulnerability is CWE-787. The product writes data past the end, or before the beginning, of the intended buffer. As an impact it is known to affect confidentiality, integrity, and availability. CVE summarizes: InCopy versions 20.5.2, 21.2 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. The advisory is available at helpx.adobe.com. This vulnerability was named CVE-2026-34631 since 03/30/2026. The exploitation appears to be easy. The attack can be initiated remotely. No form of authentication is required for a successful exploitation. Successful exploitation requires user interaction by the victim. The technical details are unknown and an exploit is not available. The structure of the vulnerability defines a possible price range of USD $0-$5k at the moment (estimation calculated on 04/14/2026). Upgrading eliminates this vulnerability. Productinfo Vendor Adobe Name InCopy Version 20.5.0 20.5.1 20.5.2 21.0 21.1 21.2 License commercial Website Vendor: https://www.adobe.com/ CPE 2.3info 🔒 🔒 🔒 CPE 2.2info 🔒 🔒 🔒 CVSSv4info VulDB Vector: 🔒 VulDB Reliability: 🔍 CVSSv3info VulDB Meta Base Score: 7.0 VulDB Meta Temp Score: 6.9 VulDB Base Score: 6.3 VulDB Temp Score: 6.0 VulDB Vector: 🔒 VulDB Reliability: 🔍 CNA Base Score: 7.8 CNA Vector (adobe): 🔒 CVSSv2info Vector Complexity Authentication Confidentiality Integrity Availability Unlock Unlock Unlock Unlock Unlock Unlock Unlock Unlock Unlock Unlock Unlock Unlock Unlock Unlock Unlock Unlock Unlock Unlock VulDB Base Score: 🔒 VulDB Temp Score: 🔒 VulDB Reliability: 🔍 Exploitinginfo Class: Out-of-bounds write CWE: CWE-787 / CWE-119 CAPEC: 🔒 ATT&CK: 🔒 Physical: Partially Local: Yes Remote: Yes Availability: 🔒 Status: Not defined Price Prediction: 🔍 Current Price Estimation: 🔒 0-Day Unlock Unlock Unlock Unlock Today Unlock Unlock Unlock Unlock Threat Intelligenceinfo Interest: 🔍 Active Actors: 🔍 Active APT Groups: 🔍 Countermeasuresinfo Recommended: Upgrade Status: 🔍 0-Day Time: 🔒 Timelineinfo 03/30/2026 CVE reserved 04/14/2026 +15 days Advisory disclosed 04/14/2026 +0 days VulDB entry created 04/14/2026 +0 days VulDB entry last update Sourcesinfo Vendor: adobe.com Advisory: apsb26-33 Status: Confirmed CVE: CVE-2026-34631 (🔒) GCVE (CVE): GCVE-0-2026-34631 GCVE (VulDB): GCVE-100-357598 Entryinfo Created: 04/14/2026 23:57 Changes: 04/14/2026 23:57 (64) Complete: 🔍 Cache ID: 99:C9C:101 Discussion No comments yet. Languages: en. Please log in to comment. ◂ PreviousOverviewNext ▸
    💬 Team Notes
    Article Info
    Source
    VulDB
    Category
    ⬡ Vulnerabilities & CVEs
    Published
    Apr 15, 2026
    Archived
    Apr 15, 2026
    Full Text
    ✓ Saved locally
    Open Original ↗