Description
InCopy versions 20.5.2, 21.2 and earlier are affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to execute code in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
Published: 2026-04-14
Score: 7.8 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Patch Immediately
AI Analysis

Impact

Adobe InCopy versions 20.5.2, 21.2 and earlier are vulnerable to an out‑of‑bounds read when parsing a specially crafted file, allowing an attacker to read data past the end of an allocated memory structure. This flaw can be leveraged to execute code in the context of the current user. The vulnerability is identified as CWE‑125, and it requires a victim to open the malicious file, implying that user interaction is necessary for exploitation.

Affected Systems

The affected software is Adobe InCopy. All installations of InCopy version 20.5.2, 21.2 and any earlier releases are impacted. No information is provided about specific build or patch levels beyond the version numbers mentioned.

Risk and Exploitability

The flaw carries a CVSS v3 score of 7.8, classifying it as high severity. No EPSS score is available, and the vulnerability is not listed in the CISA Known Exploited Vulnerabilities catalog. Exploitation relies on a user‑initiated action of opening a malicious file, so the attack vector is local file use rather than a network‑based attack. Due to the lack of network exposure, the immediate risk is confined to users who access potentially untrusted documents within InCopy.

Generated by OpenCVE AI on April 14, 2026 at 22:25 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Install the latest Adobe InCopy release to eliminate the vulnerable parsing code.
  • Apply any Adobe updates released under the APSB26‑33 advisory to secure the application fully.
  • Educate users to avoid opening untrusted files in InCopy and consider disabling automatic document opening where possible.

Generated by OpenCVE AI on April 14, 2026 at 22:25 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 15 Apr 2026 19:45:00 +0000

Type Values Removed Values Added
First Time appeared Apple
Apple macos
Microsoft
Microsoft windows
CPEs cpe:2.3:a:adobe:incopy:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*
Vendors & Products Apple
Apple macos
Microsoft
Microsoft windows

Wed, 15 Apr 2026 14:30:00 +0000

Type Values Removed Values Added
First Time appeared Adobe
Adobe incopy
Vendors & Products Adobe
Adobe incopy

Wed, 15 Apr 2026 10:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 14 Apr 2026 21:00:00 +0000

Type Values Removed Values Added
Description InCopy versions 20.5.2, 21.2 and earlier are affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to execute code in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
Title InCopy | Out-of-bounds Read (CWE-125)
Weaknesses CWE-125
References
Metrics cvssV3_1

{'score': 7.8, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: adobe

Published:

Updated: 2026-04-15T09:13:11.484Z

Reserved: 2026-02-18T22:02:41.395Z

Link: CVE-2026-27287

cve-icon Vulnrichment

Updated: 2026-04-15T09:07:32.366Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-14T21:16:25.497

Modified: 2026-04-15T19:33:38.763

Link: CVE-2026-27287

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-15T14:31:57Z

Weaknesses