CVE-2026-30276
Published: 31 March 2026
Summary
CVE-2026-30276 is a critical-severity External Control of File Name or Path (CWE-73) vulnerability in Deftpdf Document Translator. Its CVSS base score is 9.8 (Critical).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 28.9th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
The strongest mitigations our analysis identified are NIST 800-53 AC-3 (Access Enforcement) and SI-10 (Information Input Validation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Requires validation of file names and paths in the import process to block arbitrary overwrites exploiting CWE-73.
Enforces approved access authorizations to prevent the file import mechanism from overwriting critical internal files.
Monitors and verifies integrity of critical system files to identify unauthorized overwrites from the import vulnerability.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Remote unauthenticated arbitrary file overwrite in public-facing DeftPDF app directly enables T1190 exploitation for initial access and RCE; resulting arbitrary code execution maps to T1059 command/script interpreter usage.
NVD Description
An arbitrary file overwrite vulnerability in DeftPDF Document Translator v54.0 allows attackers to overwrite critical internal files via the file import process, leading to arbitrary code execution or information exposure.
Deeper analysisAI
CVE-2026-30276 is an arbitrary file overwrite vulnerability in DeftPDF Document Translator version 54.0. The issue enables attackers to overwrite critical internal files via the file import process, which can lead to arbitrary code execution or information exposure. It carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), marking it as critical severity, and maps to CWE-73 (External Control of File Name or Path). The vulnerability was published on 2026-03-31.
Remote, unauthenticated attackers can exploit this flaw over the network with low attack complexity and no user interaction required. By submitting malicious files through the import functionality, they can target and overwrite essential system files, achieving high-impact effects including arbitrary code execution on the affected system or exposure of sensitive data.
Advisories and further details are available via vendor and researcher references, including https://deftpdf.com/, https://github.com/Secsys-FDU/AF_CVEs/issues/22, and https://secsys.fudan.edu.cn/. Security practitioners should review these sources for recommended mitigations, patches, or workarounds specific to DeftPDF Document Translator v54.0.
Details
- CWE(s)