High Severity Vulnerability
This vulnerability has been rated as High severity. Immediate action is recommended.
CVE-2026-27238
HighVulnerability Description
InDesign Desktop versions 20.5.2, 21.2 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
CVSS Metrics
Common Vulnerability Scoring System
Vector String:
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Known Affected Software
73 configuration(s) from 1 vendor(s)
cpe:2.3:a:adobe:indesign:18.5.4:*:*:*:*:*:*:*
cpe:2.3:a:adobe:indesign:9.3.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:indesign:19.5.1:*:*:*:*:*:*:*
cpe:2.3:a:adobe:indesign:7.5.3:*:*:*:*:*:*:*
cpe:2.3:a:adobe:indesign:21.1:*:*:*:*:*:*:*
cpe:2.3:a:adobe:indesign:16.4.1:*:*:*:*:*:*:*
cpe:2.3:a:adobe:indesign:8.0.2:*:*:*:*:*:*:*
cpe:2.3:a:adobe:indesign:20.5:*:*:*:*:*:*:*
cpe:2.3:a:adobe:indesign:8.1.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:indesign:15.1.1:*:*:*:*:*:*:*
cpe:2.3:a:adobe:indesign:11.3.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:indesign:19.5.4:*:*:*:*:*:*:*
cpe:2.3:a:adobe:indesign:12.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:indesign:9.2.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:indesign:11.4.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:indesign:6.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:indesign:19.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:indesign:20.0.2:*:*:*:*:*:*:*
cpe:2.3:a:adobe:indesign:20.0.1:*:*:*:*:*:*:*
cpe:2.3:a:adobe:indesign:16.3:*:*:*:*:*:*:*
cpe:2.3:a:adobe:indesign:17.4.1:*:*:*:*:*:*:*
cpe:2.3:a:adobe:indesign:11.4.1:*:*:*:*:*:*:*
cpe:2.3:a:adobe:indesign:18.5.1:*:*:*:*:*:*:*
cpe:2.3:a:adobe:indesign:12.1:*:*:*:*:*:*:*
cpe:2.3:a:adobe:indesign:16.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:indesign:19.5.3:*:*:*:*:*:*:*
cpe:2.3:a:adobe:indesign:20.1:*:*:*:*:*:*:*
cpe:2.3:a:adobe:indesign:7.0.2:*:*:*:*:*:*:*
cpe:2.3:a:adobe:indesign:19.5:*:*:*:*:*:*:*
cpe:2.3:a:adobe:indesign:18.5.3:*:*:*:*:*:*:*
cpe:2.3:a:adobe:indesign:9.2.1:*:*:*:*:*:*:*
cpe:2.3:a:adobe:indesign:7.5.2:*:*:*:*:*:*:*
cpe:2.3:a:adobe:indesign:14.0.1:*:*:*:*:*:*:*
cpe:2.3:a:adobe:indesign:15.1.2:*:*:*:*:*:*:*
cpe:2.3:a:adobe:indesign:16.3.2:*:*:*:*:*:*:*
cpe:2.3:a:adobe:indesign:5.0.1:*:*:*:*:*:*:*
cpe:2.3:a:adobe:indesign:20.2:*:*:*:*:*:*:*
cpe:2.3:a:adobe:indesign:18.5:*:*:*:*:*:*:*
cpe:2.3:a:adobe:indesign:7.0.3:*:*:*:*:*:*:*
cpe:2.3:a:adobe:indesign:21.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:indesign:19.5.5:*:*:*:*:*:*:*
cpe:2.3:a:adobe:indesign:18.3:*:*:*:*:*:*:*
cpe:2.3:a:adobe:indesign:7.5.1:*:*:*:*:*:*:*
cpe:2.3:a:adobe:indesign:9.1.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:indesign:11.0.1:*:*:*:*:*:*:*
cpe:2.3:a:adobe:indesign:11.1.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:indesign:9.2.2:*:*:*:*:*:*:*
cpe:2.3:a:adobe:indesign:11.2.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:indesign:17.4.2:*:*:*:*:*:*:*
cpe:2.3:a:adobe:indesign:20.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:indesign:17.2.1:*:*:*:*:*:*:*
cpe:2.3:a:adobe:indesign:19.4:*:*:*:*:*:*:*
cpe:2.3:a:adobe:indesign:13.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:indesign:18.1:*:*:*:*:*:*:*
cpe:2.3:a:adobe:indesign:3.0.1:*:*:*:*:*:*:*
cpe:2.3:a:adobe:indesign:20.3:*:*:*:*:*:*:*
cpe:2.3:a:adobe:indesign:16.4:*:*:*:*:*:*:*
cpe:2.3:a:adobe:indesign:21.0.1:*:*:*:*:*:*:*
cpe:2.3:a:adobe:indesign:18.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:indesign:5.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:indesign:13.0.1:*:*:*:*:*:*:*
cpe:2.3:a:adobe:indesign:3.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:indesign:20.4:*:*:*:*:*:*:*
cpe:2.3:a:adobe:indesign:19.3:*:*:*:*:*:*:*
cpe:2.3:a:adobe:indesign:19.5.2:*:*:*:*:*:*:*
cpe:2.3:a:adobe:indesign:4.0.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:indesign:20.5.1:*:*:*:*:*:*:*
cpe:2.3:a:adobe:indesign:18.5.2:*:*:*:*:*:*:*
cpe:2.3:a:adobe:indesign:5.0.2:*:*:*:*:*:*:*
cpe:2.3:a:adobe:indesign:13.1:*:*:*:*:*:*:*
cpe:2.3:a:adobe:indesign:7.0.4:*:*:*:*:*:*:*
cpe:2.3:a:adobe:indesign:17.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:indesign:8.0.1:*:*:*:*:*:*:*
Severity Details
Weakness Type (CWE)
Heap-based Buffer Overflow
- Description
- A heap overflow condition is a buffer overflow, where the buffer that can be overwritten is allocated in the heap portion of memory, generally meaning that the buffer was allocated using a routine such as malloc().
- Exploit Likelihood
- High
- Typical Severity
- High
- Abstraction Level
- Variant
Key Information
- Published Date
- April 14, 2026
