Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-43558: Out-of-bounds Write (CWE-787) in Adobe InDesign Desktop

0
High
VulnerabilityCVE-2025-43558cvecve-2025-43558cwe-787
Published: Tue Jun 10 2025 (06/10/2025, 16:23:02 UTC)
Source: CVE Database V5
Vendor/Project: Adobe
Product: InDesign Desktop

Description

InDesign Desktop versions ID20.2, ID19.5.3 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 02:20:16 UTC

Technical Analysis

CVE-2025-43558 is an out-of-bounds write vulnerability classified under CWE-787 that affects Adobe InDesign Desktop versions ID20.2, ID19.5.3, and earlier. The vulnerability arises when the software improperly handles memory boundaries during file processing, allowing an attacker to write data outside the intended buffer. This memory corruption can be leveraged to execute arbitrary code within the context of the current user. Exploitation requires the victim to open a maliciously crafted InDesign file, making user interaction mandatory. The vulnerability does not require any prior authentication or elevated privileges, increasing its risk profile. The CVSS v3.1 base score is 7.8, reflecting high impact on confidentiality, integrity, and availability, with low attack complexity and no privileges required. Although no public exploits have been reported yet, the nature of the vulnerability and Adobe’s widespread use make it a significant concern. Adobe has not yet released patches, so users remain exposed. The vulnerability could be exploited to install malware, steal sensitive data, or disrupt operations by crashing the application or system. Given Adobe InDesign's prevalence in creative and publishing industries, the threat could impact a broad range of organizations globally.

Potential Impact

The vulnerability enables attackers to execute arbitrary code with the same privileges as the current user, potentially leading to full system compromise if the user has administrative rights. Confidentiality is at risk as attackers could access sensitive documents and data processed by InDesign. Integrity could be compromised by altering files or injecting malicious content. Availability may be affected through application crashes or denial-of-service conditions triggered by malformed files. Organizations relying on Adobe InDesign for content creation, publishing, and design workflows face operational disruptions and data breaches. The requirement for user interaction limits automated widespread exploitation but targeted spear-phishing or supply chain attacks remain plausible. The absence of patches increases exposure duration, raising the risk of future exploit development and deployment. The impact is particularly critical for enterprises handling sensitive intellectual property or regulated data.

Mitigation Recommendations

Organizations should immediately implement strict controls on the sources of InDesign files, including disabling automatic opening of files from untrusted or unknown origins. Employ application whitelisting to restrict execution of unauthorized code and sandbox Adobe InDesign processes to limit the impact of potential exploitation. Monitor and educate users about the risks of opening unsolicited or suspicious files. Use endpoint detection and response (EDR) tools to detect anomalous behaviors indicative of exploitation attempts. Regularly back up critical data to enable recovery from potential compromises. Stay alert for Adobe security advisories and apply patches promptly once released. Consider deploying network-level protections such as email filtering and file scanning to block malicious attachments. For high-risk environments, evaluate temporary use of alternative software or disabling InDesign until a patch is available.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
adobe
Date Reserved
2025-04-16T16:23:13.180Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68487f531b0bd07c39389e61

Added to database: 6/10/2025, 6:54:11 PM

Last enriched: 2/27/2026, 2:20:16 AM

Last updated: 3/28/2026, 9:32:33 AM

Views: 65

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses