Description
Bridge versions 16.0.2, 15.1.4 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
Published: 2026-04-14
Score: 7.8 High
EPSS: < 1% Very Low
KEV: No
Impact: Arbitrary code execution
Action: Immediate Patch
AI Analysis

Impact

Adobe Bridge contains a heap‑based buffer overflow that allows an attacker to write beyond a buffer boundary when processing a specially crafted file. The flaw can lead to arbitrary code execution in the context of the user running Bridge, representing a significant compromise of confidentiality, integrity, and availability. This is a memory corruption vulnerability classified as CWE‑122.

Affected Systems

Adobe Bridge releases 16.0.2, 15.1.4 and all earlier versions are affected. The issue can be triggered on any platform where these versions run by opening a malicious file.

Risk and Exploitability

The vulnerability carries a CVSS score of 7.8, indicating high severity. Exploitation requires a victim to open a malicious file, so user interaction is mandatory. No EPSS score is available, and the flaw is not listed in CISA’s KEV catalog, suggesting no publicly known exploits yet. Nevertheless, the combination of high severity and a user‑interaction attack vector makes this a critical risk for environments where users handle untrusted files.

Generated by OpenCVE AI on April 14, 2026 at 21:15 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest Adobe Bridge update from Adobe’s official website; the current patch removes the heap‑based buffer overflow.
  • Avoid opening unknown or suspicious files in Adobe Bridge; treat any file that appears untrusted as potentially malicious.
  • When possible, restrict the file types that Bridge can open or run Bridge in a sandboxed environment to isolate execution.
  • Keep the operating system and all related Adobe applications updated to the latest security releases.
  • Monitor Adobe security advisories for further updates or additional mitigations.

Generated by OpenCVE AI on April 14, 2026 at 21:15 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 15 Apr 2026 20:00:00 +0000

Type Values Removed Values Added
First Time appeared Apple
Apple macos
Microsoft
Microsoft windows
CPEs cpe:2.3:a:adobe:bridge:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*
Vendors & Products Apple
Apple macos
Microsoft
Microsoft windows

Wed, 15 Apr 2026 14:45:00 +0000

Type Values Removed Values Added
First Time appeared Adobe
Adobe bridge
Vendors & Products Adobe
Adobe bridge

Wed, 15 Apr 2026 10:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 14 Apr 2026 20:15:00 +0000

Type Values Removed Values Added
Description Bridge versions 16.0.2, 15.1.4 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
Title Bridge | Heap-based Buffer Overflow (CWE-122)
Weaknesses CWE-122
References
Metrics cvssV3_1

{'score': 7.8, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: adobe

Published:

Updated: 2026-04-15T09:13:11.961Z

Reserved: 2026-02-18T22:02:41.402Z

Link: CVE-2026-27313

cve-icon Vulnrichment

Updated: 2026-04-15T09:07:37.357Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-14T20:16:34.883

Modified: 2026-04-15T19:59:05.720

Link: CVE-2026-27313

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-15T14:41:09Z

Weaknesses