CVE-2026-27238
Published: 14 April 2026
Summary
CVE-2026-27238 is a high-severity Heap-based Buffer Overflow (CWE-122) vulnerability in Adobe Indesign. Its CVSS base score is 7.8 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Client Execution (T1203); ranked at the 7.7th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-16 (Memory Protection) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly requires identification, reporting, and correction of the heap-based buffer overflow flaw in vulnerable InDesign versions through timely patching as detailed in Adobe bulletin APSB26-32.
Implements memory protections such as address space layout randomization and data execution prevention to block arbitrary code execution from heap-based buffer overflows.
Ensures receipt, dissemination, and implementation of security advisories like APSB26-32 to address the specific InDesign vulnerability before exploitation.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Heap buffer overflow in client app (InDesign) enables arbitrary code execution via malicious file opened by user (T1203 Exploitation for Client Execution + T1204.002 Malicious File).
NVD Description
InDesign Desktop versions 20.5.2, 21.2 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim…
more
must open a malicious file.
Deeper analysisAI
CVE-2026-27238 is a heap-based buffer overflow vulnerability (CWE-122) affecting Adobe InDesign Desktop versions 20.5.2, 21.2, and earlier. The flaw could result in arbitrary code execution in the context of the current user. It has a CVSS v3.1 base score of 7.8 (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H) and was published on 2026-04-14.
Exploitation requires user interaction, as a victim must open a malicious file. A local attacker with no privileges can craft and deliver such a file, tricking the user into opening it to achieve arbitrary code execution with the privileges of the logged-in user.
Adobe Security Bulletin APSB26-32 details the issue and mitigation steps, available at https://helpx.adobe.com/security/products/indesign/apsb26-32.html.
Details
- CWE(s)