Description
After Effects versions 25.6 and earlier are affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to execute code in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
Published: 2026-02-10
Score: 7.8 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution (local) via out‑of‑bounds read in After Effects
Action: Immediate Patch
AI Analysis

Impact

A crafted After Effects file can trigger an out‑of‑bounds read that allows an attacker to execute code within the context of the current user. The vulnerability is caused by improper bounds checking during file parsing and only results in memory reads beyond the allocated structure. Successful exploitation requires user interaction: the victim must open the malicious file, after which arbitrary code can be executed with the victim’s privileges.

Affected Systems

Adobe After Effects versions 25.6 and earlier on macOS and Windows are affected. The issue is present in all builds of these versions on the listed operating systems.

Risk and Exploitability

The vulnerability has a high CVSS score of 7.8, but the EPSS score is less than 1 % indicating a low probability of widespread exploitation. It is not currently listed in CISA’s KEV catalog. To exploit it, an attacker must obtain or convince a user to open a malicious file; there is no remote network component. The vulnerability is therefore local and requires user interaction.

Generated by OpenCVE AI on April 17, 2026 at 20:39 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Adobe After Effects to the latest version that contains the security fix for CVE‑2026‑21325.
  • Configure the application to reject or quarantine unknown or signed files before opening, and disable auto‑opening of files from untrusted sources.
  • Employ endpoint protection that monitors for suspicious memory access patterns, and maintain up‑to‑date antivirus signatures to detect associated malicious files.

Generated by OpenCVE AI on April 17, 2026 at 20:39 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 26 Feb 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 11 Feb 2026 17:45:00 +0000

Type Values Removed Values Added
First Time appeared Apple
Apple macos
Microsoft
Microsoft windows
CPEs cpe:2.3:a:adobe:after_effects:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*
Vendors & Products Apple
Apple macos
Microsoft
Microsoft windows

Tue, 10 Feb 2026 21:45:00 +0000

Type Values Removed Values Added
First Time appeared Adobe
Adobe after Effects
Vendors & Products Adobe
Adobe after Effects

Tue, 10 Feb 2026 18:15:00 +0000

Type Values Removed Values Added
Description After Effects versions 25.6 and earlier are affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to execute code in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
Title After Effects | Out-of-bounds Read (CWE-125)
Weaknesses CWE-125
References
Metrics cvssV3_1

{'score': 7.8, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}


Subscriptions

Adobe After Effects
Apple Macos
Microsoft Windows
cve-icon MITRE

Status: PUBLISHED

Assigner: adobe

Published:

Updated: 2026-02-26T14:44:36.473Z

Reserved: 2025-12-12T22:01:18.194Z

Link: CVE-2026-21325

cve-icon Vulnrichment

Updated: 2026-02-25T15:42:23.008Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-10T18:16:30.230

Modified: 2026-02-11T17:36:38.050

Link: CVE-2026-21325

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T20:45:25Z

Weaknesses