Description
Illustrator versions 30.2, 29.8.5 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
Published: 2026-04-14
Score: 7.8 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Immediate Patch
AI Analysis

Impact

Adobe Illustrator versions 30.2, 29.8.5 and any earlier releases are susceptible to an out‑of‑bounds write that permits an attacker to run arbitrary code with the privileges of the user opening the file. The flaw arises when malformed document data is processed, causing a memory corruption that a malicious designer could exploit. This bug is a classic instance of CWE‑787, where unsafe memory handling leads to executable code injection.

Affected Systems

The affected product is Adobe Illustrator, specifically all releases up to and including version 30.2 and 29.8.5. Users who are running any of these versions on Windows, macOS, or other supported operating systems are potentially vulnerable if they use the application to open files.

Risk and Exploitability

The vulnerability carries a CVSS score of 7.8, indicating a high potential for damage if exploited. While an EPSS probability score is not listed, known exploitation requires the victim to open a specially crafted file, meaning user interaction is mandatory. The flaw is not currently catalogued by CISA as a known exploited vulnerability, but the severity rating and the capability for arbitrary code execution warrant serious attention. An attacker could host malicious assets or embed them in a shared document, and any legitimate use of Illustrator could unleash executable payloads.

Generated by OpenCVE AI on April 14, 2026 at 20:27 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest Adobe Illustrator update, which patches the out‑of‑bounds write flaw.
  • If an update is not immediately available, replace Illustrator with a newer protected version or uninstall the vulnerable application until a patch arrives.
  • Restrict the opening of untrusted files by disabling automatic file opening or using a sandboxed environment when handling unknown documents.
  • Verify your installed Illustrator version by checking the About menu and confirm it is above 30.2 or 29.8.5 to ensure protection.

Generated by OpenCVE AI on April 14, 2026 at 20:27 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 15 Apr 2026 19:45:00 +0000

Type Values Removed Values Added
First Time appeared Apple
Apple macos
Microsoft
Microsoft windows
CPEs cpe:2.3:a:adobe:illustrator:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*
Vendors & Products Apple
Apple macos
Microsoft
Microsoft windows

Wed, 15 Apr 2026 14:45:00 +0000

Type Values Removed Values Added
First Time appeared Adobe
Adobe illustrator
Vendors & Products Adobe
Adobe illustrator

Wed, 15 Apr 2026 10:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 14 Apr 2026 19:45:00 +0000

Type Values Removed Values Added
Description Illustrator versions 30.2, 29.8.5 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
Title Illustrator | Out-of-bounds Write (CWE-787)
Weaknesses CWE-787
References
Metrics cvssV3_1

{'score': 7.8, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: adobe

Published:

Updated: 2026-04-15T09:13:12.280Z

Reserved: 2026-03-30T17:30:36.490Z

Link: CVE-2026-34618

cve-icon Vulnrichment

Updated: 2026-04-15T09:07:41.529Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-14T20:16:47.523

Modified: 2026-04-15T19:34:05.737

Link: CVE-2026-34618

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-15T14:41:09Z

Weaknesses