CVE-2026-27295
Published: 14 April 2026
Summary
CVE-2026-27295 is a high-severity Out-of-bounds Write (CWE-787) vulnerability in Adobe Framemaker. Its CVSS base score is 7.8 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Client Execution (T1203); ranked at the 9.9th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-16 (Memory Protection) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly mitigates CVE-2026-27295 by requiring timely application of Adobe's security updates to remediate the out-of-bounds write flaw.
Implements memory protection mechanisms like ASLR and DEP that prevent exploitation of the out-of-bounds write vulnerability leading to arbitrary code execution.
Deploys malicious code protection to scan and block malformed files that could trigger the out-of-bounds write upon opening in Adobe FrameMaker.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Out-of-bounds write in FrameMaker enables arbitrary code execution when a user opens a crafted malicious file (local access + UI interaction), directly mapping to client-side exploitation and malicious file user execution.
NVD Description
Adobe Framemaker versions 2022.8 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open…
more
a malicious file.
Deeper analysisAI
CVE-2026-27295 is an out-of-bounds write vulnerability (CWE-787) affecting Adobe FrameMaker versions 2022.8 and earlier. This flaw could lead to arbitrary code execution in the context of the current user when processing malformed files. The vulnerability received a CVSS v3.1 base score of 7.8 (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H) and was published on April 14, 2026.
Exploitation requires local access and user interaction, specifically a victim opening a malicious file. An attacker with no privileges can craft such a file to trigger the out-of-bounds write, potentially achieving full control over the affected system with high impacts to confidentiality, integrity, and availability in the user's context.
Adobe's security bulletin APSB26-36, available at https://helpx.adobe.com/security/products/framemaker/apsb26-36.html, provides details on the vulnerability and recommends applying the latest security updates to mitigate the issue.
Details
- CWE(s)