Description
Substance3D - Sampler versions 5.1.0 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
Published: 2026-01-13
Score: 7.8 High
EPSS: < 1% Very Low
KEV: No
Impact: Arbitrary Code Execution
Action: Immediate Patch
AI Analysis

Impact

Substance3D - Sampler versions 5.1.0 and earlier contain an out‑of‑bounds write (CWE‑787) that can be triggered by a crafted file, allowing an attacker to execute arbitrary code in the context of the current user. This vulnerability directly threatens confidentiality, integrity, and availability by permitting unauthorized code execution, which could lead to data exposure, tampering, or system disruption.

Affected Systems

Adobe’s Substance3D - Sampler is affected. All installations running version 5.1.0 or earlier are vulnerable; newer releases contain the patch for this issue.

Risk and Exploitability

The CVSS base score of 7.8 indicates a high security impact, but the EPSS probability is less than 1 %, suggesting a low likelihood of widespread exploitation. The vulnerability is not listed in the KEV catalog, and its exploitation path requires a local, user‑initiated action—specifically the opening of a malicious Substance3D sampler file—rather than a remote trigger.

Generated by OpenCVE AI on April 18, 2026 at 16:21 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update Substance3D - Sampler to the latest release that includes the out‑of‑bounds write fix, following the guidance in Adobe’s security advisory
  • Restrict the use of the application to trusted users only and monitor for any unauthorized file opening
  • As a temporary measure, block automatic execution of any unknown Substance3D sampler files by disabling the associated file‑type association or instructing users to verify file authenticity before opening

Generated by OpenCVE AI on April 18, 2026 at 16:21 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 14 Jan 2026 18:00:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:adobe:substance_3d_sampler:*:*:*:*:*:*:*:*

Wed, 14 Jan 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 14 Jan 2026 11:15:00 +0000

Type Values Removed Values Added
First Time appeared Adobe
Adobe substance 3d Sampler
Vendors & Products Adobe
Adobe substance 3d Sampler

Tue, 13 Jan 2026 20:00:00 +0000

Type Values Removed Values Added
Description Substance3D - Sampler versions 5.1.0 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
Title Substance3D - Sampler | Out-of-bounds Write (CWE-787)
Weaknesses CWE-787
References
Metrics cvssV3_1

{'score': 7.8, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}


Subscriptions

Adobe Substance 3d Sampler
cve-icon MITRE

Status: PUBLISHED

Assigner: adobe

Published:

Updated: 2026-02-26T15:04:13.449Z

Reserved: 2025-12-12T22:01:18.192Z

Link: CVE-2026-21306

cve-icon Vulnrichment

Updated: 2026-01-14T15:10:39.884Z

cve-icon NVD

Status : Analyzed

Published: 2026-01-13T20:16:09.607

Modified: 2026-01-14T17:57:37.057

Link: CVE-2026-21306

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T16:30:05Z

Weaknesses