Description
Adobe Framemaker versions 2022.8 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
Published: 2026-04-14
Score: 7.8 High
EPSS: < 1% Very Low
KEV: No
Impact: Arbitrary Code Execution
Action: Immediate Patch
AI Analysis

Impact

A heap‑based buffer overflow in Adobe Framemaker allows a maliciously crafted file to overwrite memory when it is opened. The vulnerability can enable an attacker to execute arbitrary code within the context of the user who opens the file, potentially compromising that user’s data and system integrity. The flaw is a classic example of unchecked memory write (CWE‑122).

Affected Systems

Adobe Framemaker versions 2022.8 and all earlier releases are affected. These include both the desktop application and any integrated components that handle external content. Users who run the software on any platform are susceptible when they open an untrusted file.

Risk and Exploitability

The CVSS score of 7.8 indicates high severity, and the lack of an available EPSS score means the exploitation probability is undetermined. The vulnerability does not appear in the CISA KEV catalog, so there is no current evidence of widespread exploitation. The likely attack vector requires a victim to open a malicious document, which means the threat depends on user interaction. If users are exposed to unsolicited or untrusted files, the risk of exploitation is significant. Advisory guidance emphasizes the importance of applying patches to mitigate this risk.

Generated by OpenCVE AI on April 15, 2026 at 00:24 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest Adobe Framemaker security patch or upgrade to a supported version as listed in Adobe’s APSB26‑36 advisory
  • Restrict user access to opening untrusted Adobe FrameMaker files and instruct users to verify the source of any file before opening it
  • If possible, disable or sandbox the feature that imports or processes external contents in Framemaker, or use an application firewall to block anomalous execution patterns

Generated by OpenCVE AI on April 15, 2026 at 00:24 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 15 Apr 2026 18:30:00 +0000

Type Values Removed Values Added
First Time appeared Microsoft
Microsoft windows
CPEs cpe:2.3:a:adobe:framemaker:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*
Vendors & Products Microsoft
Microsoft windows

Wed, 15 Apr 2026 15:15:00 +0000

Type Values Removed Values Added
First Time appeared Adobe
Adobe framemaker
Vendors & Products Adobe
Adobe framemaker

Wed, 15 Apr 2026 10:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 14 Apr 2026 23:15:00 +0000

Type Values Removed Values Added
Description Adobe Framemaker versions 2022.8 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
Title Adobe Framemaker | Heap-based Buffer Overflow (CWE-122)
Weaknesses CWE-122
References
Metrics cvssV3_1

{'score': 7.8, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}


Subscriptions

Adobe Framemaker
Microsoft Windows
cve-icon MITRE

Status: PUBLISHED

Assigner: adobe

Published:

Updated: 2026-04-15T09:13:10.769Z

Reserved: 2026-02-18T22:02:41.396Z

Link: CVE-2026-27293

cve-icon Vulnrichment

Updated: 2026-04-15T09:07:23.634Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-14T23:16:26.150

Modified: 2026-04-15T18:15:25.963

Link: CVE-2026-27293

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-15T14:53:49Z

Weaknesses