CVE-2026-30292
Published: 01 April 2026
Summary
CVE-2026-30292 is a high-severity External Control of File Name or Path (CWE-73) vulnerability in Bitbucket (inferred from references). Its CVSS base score is 8.4 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Client Execution (T1203); ranked at the 5.3th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Requires validation of information inputs, such as files during the import process, to prevent malicious files from overwriting critical internal files.
Mandates timely flaw remediation, including patching the arbitrary file overwrite vulnerability in the PDF Reader app's file import process.
Enforces integrity checks on software and critical files to identify unauthorized modifications resulting from malicious file imports.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Arbitrary file overwrite in PDF reader client app directly enables exploitation to achieve RCE (or info disclosure) on the local system with no user interaction or privileges required.
NVD Description
An arbitrary file overwrite vulnerability in Docudepot PDF Reader: PDF Viewer APP v1.0.34 allows attackers to overwrite critical internal files via the file import process, leading to arbitrary code execution or information exposure.
Deeper analysisAI
CVE-2026-30292 is an arbitrary file overwrite vulnerability (CWE-73) in Docudepot PDF Reader: PDF Viewer APP version 1.0.34. The issue arises during the file import process, where attackers can overwrite critical internal files, potentially leading to arbitrary code execution or information exposure. Published on 2026-04-01, it carries a CVSS v3.1 base score of 8.4 (AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), reflecting high confidentiality, integrity, and availability impacts.
A local attacker can exploit this vulnerability with low attack complexity, requiring no privileges or user interaction. By crafting a malicious file for import, the attacker overwrites essential internal files, achieving arbitrary code execution on the device or exposing sensitive information stored within the application.
Advisories and further details are available in the provided references, including the vendor site at https://docudepot.bitbucket.io/, a GitHub issue at https://github.com/Secsys-FDU/AF_CVEs/issues/20, the Google Play Store listing at https://play.google.com/store/apps/details?id=pdf.pdfreader.pdfeditor.pdfmaker.pdfscanner, and the Secsys Fudan page at https://secsys.fudan.edu.cn/. Security practitioners should review these for any patch availability or mitigation guidance.
Details
- CWE(s)