Cyber Posture

CVE-2026-30292

High

Published: 01 April 2026

Published
01 April 2026
Modified
27 April 2026
KEV Added
Patch
CVSS Score 8.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0002 5.3th percentile
Risk Priority 17 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-30292 is a high-severity External Control of File Name or Path (CWE-73) vulnerability in Bitbucket (inferred from references). Its CVSS base score is 8.4 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Client Execution (T1203); ranked at the 5.3th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploitation for Client Execution (T1203). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Requires validation of information inputs, such as files during the import process, to prevent malicious files from overwriting critical internal files.

prevent

Mandates timely flaw remediation, including patching the arbitrary file overwrite vulnerability in the PDF Reader app's file import process.

detect

Enforces integrity checks on software and critical files to identify unauthorized modifications resulting from malicious file imports.

MITRE ATT&CK Enterprise TechniquesAI

T1203 Exploitation for Client Execution Execution
Adversaries may exploit software vulnerabilities in client applications to execute code.
Why these techniques?

Arbitrary file overwrite in PDF reader client app directly enables exploitation to achieve RCE (or info disclosure) on the local system with no user interaction or privileges required.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

An arbitrary file overwrite vulnerability in Docudepot PDF Reader: PDF Viewer APP v1.0.34 allows attackers to overwrite critical internal files via the file import process, leading to arbitrary code execution or information exposure.

Deeper analysisAI

CVE-2026-30292 is an arbitrary file overwrite vulnerability (CWE-73) in Docudepot PDF Reader: PDF Viewer APP version 1.0.34. The issue arises during the file import process, where attackers can overwrite critical internal files, potentially leading to arbitrary code execution or information exposure. Published on 2026-04-01, it carries a CVSS v3.1 base score of 8.4 (AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), reflecting high confidentiality, integrity, and availability impacts.

A local attacker can exploit this vulnerability with low attack complexity, requiring no privileges or user interaction. By crafting a malicious file for import, the attacker overwrites essential internal files, achieving arbitrary code execution on the device or exposing sensitive information stored within the application.

Advisories and further details are available in the provided references, including the vendor site at https://docudepot.bitbucket.io/, a GitHub issue at https://github.com/Secsys-FDU/AF_CVEs/issues/20, the Google Play Store listing at https://play.google.com/store/apps/details?id=pdf.pdfreader.pdfeditor.pdfmaker.pdfscanner, and the Secsys Fudan page at https://secsys.fudan.edu.cn/. Security practitioners should review these for any patch availability or mitigation guidance.

Details

CWE(s)

Affected Products

Bitbucket
inferred from references and description; NVD did not file a CPE for this CVE

CVEs Like This One

CVE-2026-30287Shared CWE-73
CVE-2026-35465Shared CWE-73
CVE-2026-30289Shared CWE-73
CVE-2026-30291Shared CWE-73
CVE-2026-30284Shared CWE-73
CVE-2026-28442Shared CWE-73
CVE-2025-66254Shared CWE-73
CVE-2025-25761Shared CWE-73
CVE-2026-25605Shared CWE-73
CVE-2026-26360Shared CWE-73

References