Description
InDesign Desktop versions 20.5.2, 21.2 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
Published: 2026-04-14
Score: 7.8 High
EPSS: < 1% Very Low
KEV: No
Impact: Arbitrary code execution
Action: Apply patch
AI Analysis

Impact

A heap‑based buffer overflow exists in Adobe InDesign Desktop that can allow an attacker to execute arbitrary code in the context of the current user. The flaw arises from improper bounds checking when processing a malicious file, and exploitation requires the victim to open that file. Successful exploitation would let an attacker run code with the user’s privileges, compromising confidentiality, integrity, and availability.

Affected Systems

Adobe InDesign Desktop versions 20.5.2, 21.2 and earlier are affected. Users running any of these versions on supported platforms are vulnerable until they apply the Adobe security update.

Risk and Exploitability

The CVSS score of 7.8 indicates a high severity. The EPSS score is not available and the vulnerability is not listed in the CISA KEV catalog, suggesting a moderate exploitation probability. Because the attack requires user interaction—opening a crafted file—attacks are most likely delivered via email attachments or downloads. The local impact means that a successful exploit escalates to the user’s privileges, making the vulnerability critical for systems that handle untrusted documents.

Generated by OpenCVE AI on April 14, 2026 at 20:34 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Check the installed InDesign Desktop version and compare it to the latest Adobe security update for CVE‑2026‑34629.
  • Download and install the latest Adobe InDesign Desktop patch (or update to a newer release such as 22.x) to eliminate the heap overflow.
  • If an immediate update is not possible, restrict opening of unknown or untrusted files, use application sandboxing, and monitor for suspicious document activity.

Generated by OpenCVE AI on April 14, 2026 at 20:34 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 16 Apr 2026 21:30:00 +0000

Type Values Removed Values Added
First Time appeared Adobe indesign
CPEs cpe:2.3:a:adobe:indesign:*:*:*:*:*:*:*:*
Vendors & Products Adobe indesign

Wed, 15 Apr 2026 14:45:00 +0000

Type Values Removed Values Added
First Time appeared Adobe
Adobe indesign Desktop
Vendors & Products Adobe
Adobe indesign Desktop

Tue, 14 Apr 2026 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 14 Apr 2026 17:30:00 +0000

Type Values Removed Values Added
Description InDesign Desktop versions 20.5.2, 21.2 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
Title InDesign Desktop | Heap-based Buffer Overflow (CWE-122)
Weaknesses CWE-122
References
Metrics cvssV3_1

{'score': 7.8, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}


Subscriptions

Adobe Indesign Indesign Desktop
cve-icon MITRE

Status: PUBLISHED

Assigner: adobe

Published:

Updated: 2026-04-14T19:18:37.354Z

Reserved: 2026-03-30T17:30:36.491Z

Link: CVE-2026-34629

cve-icon Vulnrichment

Updated: 2026-04-14T18:33:48.322Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-14T18:17:37.230

Modified: 2026-04-16T21:21:46.700

Link: CVE-2026-34629

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-15T14:41:09Z

Weaknesses