Description
InDesign Desktop versions 20.5.2, 21.2 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
Published: 2026-04-14
Score: 7.8 High
EPSS: < 1% Very Low
KEV: No
Impact: Arbitrary code execution
Action: Immediate Patch
AI Analysis

Impact

The flaw is a heap-based buffer overflow in the desktop version of Adobe InDesign. A crafted malicious file can exploit the overflow to execute arbitrary code in the context of the user who opens the file. This leads to a loss of confidentiality, integrity, and availability for the affected system because the attacker can run any code with the victim’s privileges.

Affected Systems

Adobe InDesign Desktop applications are impacted. Versions 20.5.2, 21.2 and all earlier releases are vulnerable. The vulnerability does not affect newer releases beyond those listed.

Risk and Exploitability

The CVSS rating of 7.8 reflects a moderate to high severity. EPSS data is not available, and the issue is not present in CISA’s Known Exploited Vulnerabilities catalog. Exploitation requires local user interaction: an attacker must entice the victim to open a malicious file. Once executed, the attacker gains the victim’s user privileges, allowing code execution, data exfiltration, or further malware deployment. Users should consider this a significant risk if they frequently handle untrusted documents.

Generated by OpenCVE AI on April 14, 2026 at 19:38 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update Adobe InDesign to the latest available release that includes the patch for CVE-2026-34628.
  • If a patch is unavailable, verify that the software is configured to warn users before opening unknown or untrusted files, and follow organizational file‑handling policies.
  • Monitor for any anomalous activity on systems running affected versions and apply additional security controls such as application whitelisting if possible.

Generated by OpenCVE AI on April 14, 2026 at 19:38 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 15 Apr 2026 14:45:00 +0000

Type Values Removed Values Added
First Time appeared Adobe
Adobe indesign Desktop
Vendors & Products Adobe
Adobe indesign Desktop

Tue, 14 Apr 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 14 Apr 2026 17:30:00 +0000

Type Values Removed Values Added
Description InDesign Desktop versions 20.5.2, 21.2 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
Title InDesign Desktop | Heap-based Buffer Overflow (CWE-122)
Weaknesses CWE-122
References
Metrics cvssV3_1

{'score': 7.8, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}


Subscriptions

Adobe Indesign Desktop
cve-icon MITRE

Status: PUBLISHED

Assigner: adobe

Published:

Updated: 2026-04-14T18:22:03.150Z

Reserved: 2026-03-30T17:30:36.490Z

Link: CVE-2026-34628

cve-icon Vulnrichment

Updated: 2026-04-14T18:21:59.552Z

cve-icon NVD

Status : Undergoing Analysis

Published: 2026-04-14T18:17:37.060

Modified: 2026-04-15T16:14:07.857

Link: CVE-2026-34628

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-15T14:41:09Z

Weaknesses