Cyber Posture

CVE-2026-30276

CriticalPublic PoC

Published: 31 March 2026

Published
31 March 2026
Modified
06 April 2026
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0011 28.9th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-30276 is a critical-severity External Control of File Name or Path (CWE-73) vulnerability in Deftpdf Document Translator. Its CVSS base score is 9.8 (Critical).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 28.9th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 AC-3 (Access Enforcement) and SI-10 (Information Input Validation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Requires validation of file names and paths in the import process to block arbitrary overwrites exploiting CWE-73.

prevent

Enforces approved access authorizations to prevent the file import mechanism from overwriting critical internal files.

detect

Monitors and verifies integrity of critical system files to identify unauthorized overwrites from the import vulnerability.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1059 Command and Scripting Interpreter Execution
Adversaries may abuse command and script interpreters to execute commands, scripts, or binaries.
Why these techniques?

Remote unauthenticated arbitrary file overwrite in public-facing DeftPDF app directly enables T1190 exploitation for initial access and RCE; resulting arbitrary code execution maps to T1059 command/script interpreter usage.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

An arbitrary file overwrite vulnerability in DeftPDF Document Translator v54.0 allows attackers to overwrite critical internal files via the file import process, leading to arbitrary code execution or information exposure.

Deeper analysisAI

CVE-2026-30276 is an arbitrary file overwrite vulnerability in DeftPDF Document Translator version 54.0. The issue enables attackers to overwrite critical internal files via the file import process, which can lead to arbitrary code execution or information exposure. It carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), marking it as critical severity, and maps to CWE-73 (External Control of File Name or Path). The vulnerability was published on 2026-03-31.

Remote, unauthenticated attackers can exploit this flaw over the network with low attack complexity and no user interaction required. By submitting malicious files through the import functionality, they can target and overwrite essential system files, achieving high-impact effects including arbitrary code execution on the affected system or exposure of sensitive data.

Advisories and further details are available via vendor and researcher references, including https://deftpdf.com/, https://github.com/Secsys-FDU/AF_CVEs/issues/22, and https://secsys.fudan.edu.cn/. Security practitioners should review these sources for recommended mitigations, patches, or workarounds specific to DeftPDF Document Translator v54.0.

Details

CWE(s)

Affected Products

deftpdf
document translator
54.0

CVEs Like This One

CVE-2026-30281Shared CWE-73
CVE-2025-65115Shared CWE-73
CVE-2025-10134Shared CWE-73
CVE-2026-25573Shared CWE-73
CVE-2025-65473Shared CWE-73
CVE-2024-22341Shared CWE-73
CVE-2026-5809Shared CWE-73
CVE-2025-12529Shared CWE-73
CVE-2025-5393Shared CWE-73
CVE-2025-58762Shared CWE-73

References