Description
Substance3D - Stager versions 3.1.7 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
Published: 2026-03-10
Score: 7.8 High
EPSS: < 1% Very Low
KEV: No
Impact: Arbitrary code execution
Action: Patch Immediately
AI Analysis

Impact

Substance3D – Stager versions 3.1.7 and earlier contain a use‑after‑free flaw that can empower an attacker to run arbitrary code in the context of the user who opens a malicious file. The vulnerability is a classic memory corruption bug (CWE‑416), and the official description indicates that exploitation demands user interaction: a victim must deliberately open a crafted file. If successful, the attacker can gain full control over the target system with the privileges of the logged‑in user, potentially leading to data theft, malware deployment, or a pivot to internal assets.

Affected Systems

Adobe’s Substance3D – Stager software is affected. The issue applies to all affected releases up to and including 3.1.7, as well as any platforms that run that code, notably macOS and Windows environments that host the application.

Risk and Exploitability

The CVSS score of 7.8 reflects a high severity, and the EPSS score of less than 1% shows that, at the time of this analysis, the probability of exploitation is low. However, because the flaw allows full user‑level code execution and exploitation requires only a malicious file, the risk to organizations that enable users to open or drag files into the application is significant. The vulnerability is not listed in the CISA KEV catalog, but its nature and impact warrant immediate attention.

Generated by OpenCVE AI on April 16, 2026 at 03:36 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade to the latest Substance3D Stager release or apply the vendor’s patch for the affected versions
  • Disable automatic execution of unsigned or unfamiliar document files that invoke Substance3D Stager, such as by configuring the operating system’s file type associations or using application whitelisting
  • Limit user privileges to only those required to run Substance3D Stager and enforce a strict file‑open policy for untrusted content

Generated by OpenCVE AI on April 16, 2026 at 03:36 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 11 Mar 2026 18:30:00 +0000

Type Values Removed Values Added
First Time appeared Apple
Apple macos
Microsoft
Microsoft windows
CPEs cpe:2.3:a:adobe:substance_3d_stager:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*
Vendors & Products Apple
Apple macos
Microsoft
Microsoft windows

Wed, 11 Mar 2026 12:00:00 +0000

Type Values Removed Values Added
First Time appeared Adobe
Adobe substance 3d Stager
Vendors & Products Adobe
Adobe substance 3d Stager

Tue, 10 Mar 2026 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 10 Mar 2026 19:00:00 +0000

Type Values Removed Values Added
Description Substance3D - Stager versions 3.1.7 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
Title Substance3D - Stager | Use After Free (CWE-416)
Weaknesses CWE-416
References
Metrics cvssV3_1

{'score': 7.8, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}


Subscriptions

Adobe Substance 3d Stager
Apple Macos
Microsoft Windows
cve-icon MITRE

Status: PUBLISHED

Assigner: adobe

Published:

Updated: 2026-03-11T03:57:03.202Z

Reserved: 2026-02-18T22:02:41.389Z

Link: CVE-2026-27277

cve-icon Vulnrichment

Updated: 2026-03-10T19:10:29.060Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-10T19:17:19.917

Modified: 2026-03-11T18:22:25.347

Link: CVE-2026-27277

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T03:45:16Z

Weaknesses