Description
Illustrator versions 29.8.3, 30.0 and earlier are affected by an Untrusted Search Path vulnerability that could result in arbitrary code execution in the context of the current user. If the application uses a search path to locate critical resources such as programs, an attacker could modify that search path to point to a malicious program, which the targeted application would then execute. Exploitation of this issue requires user interaction in that a victim must open a malicious file and scope is changed.
Published: 2026-01-13
Score: 8.6 High
EPSS: < 1% Very Low
KEV: No
Impact: Arbitrary code execution
Action: Immediate patch
AI Analysis

Impact

The vulnerability arises from Adobe Illustrator’s handling of untrusted search paths when locating critical resources such as executable programs. The application does not verify that the program found on the search path comes from a trusted directory, allowing an attacker to place a malicious executable in a location the path resolves to. If a victim opens a crafted file, Illustrator will launch that program in the context of the current user, enabling arbitrary code execution.

Affected Systems

Adobe Illustrator versions 29.8.3, 30.0 and every earlier release on macOS and Windows are affected.

Risk and Exploitability

The CVSS score of 8.6 indicates high severity, while the EPSS score of less than 1% suggests a low probability of widespread exploitation. The flaw requires user interaction, so it is not a remote exploit but can be targeted to individual users who open malicious files. It is not listed in the CISA KEV catalog, but due to the high impact of execution, organizations should treat it as a critical issue.

Generated by OpenCVE AI on April 18, 2026 at 06:34 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade to the latest Adobe Illustrator release that contains the fix for the untrusted search path issue.
  • Remove or disable older Illustrator installations that are vulnerable to prevent accidental use.
  • Educate users to avoid opening files from untrusted sources and verify file associations before execution.

Generated by OpenCVE AI on April 18, 2026 at 06:34 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 14 Jan 2026 19:30:00 +0000

Type Values Removed Values Added
First Time appeared Apple
Apple macos
Microsoft
Microsoft windows
CPEs cpe:2.3:a:adobe:illustrator:*:*:*:*:*:*:*:*
cpe:2.3:a:adobe:illustrator:30.0:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*
Vendors & Products Apple
Apple macos
Microsoft
Microsoft windows

Wed, 14 Jan 2026 11:15:00 +0000

Type Values Removed Values Added
First Time appeared Adobe
Adobe illustrator
Vendors & Products Adobe
Adobe illustrator

Tue, 13 Jan 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 13 Jan 2026 19:00:00 +0000

Type Values Removed Values Added
Description Illustrator versions 29.8.3, 30.0 and earlier are affected by an Untrusted Search Path vulnerability that could result in arbitrary code execution in the context of the current user. If the application uses a search path to locate critical resources such as programs, an attacker could modify that search path to point to a malicious program, which the targeted application would then execute. Exploitation of this issue requires user interaction in that a victim must open a malicious file and scope is changed.
Title Illustrator | Untrusted Search Path (CWE-426)
Weaknesses CWE-426
References
Metrics cvssV3_1

{'score': 8.6, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: adobe

Published:

Updated: 2026-02-26T15:04:14.949Z

Reserved: 2025-12-12T22:01:18.188Z

Link: CVE-2026-21280

cve-icon Vulnrichment

Updated: 2026-01-13T19:01:23.087Z

cve-icon NVD

Status : Analyzed

Published: 2026-01-13T19:16:25.693

Modified: 2026-01-14T19:28:23.530

Link: CVE-2026-21280

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T06:45:23Z

Weaknesses