Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-21278: Out-of-bounds Read (CWE-125) in Adobe InDesign Desktop

0
Medium
VulnerabilityCVE-2026-21278cvecve-2026-21278cwe-125
Published: Tue Jan 13 2026 (01/13/2026, 18:35:36 UTC)
Source: CVE Database V5
Vendor/Project: Adobe
Product: InDesign Desktop

Description

CVE-2026-21278 is an out-of-bounds read vulnerability in Adobe InDesign Desktop versions 21. 0, 19. 5. 5, and earlier. This flaw allows an attacker to cause memory exposure by crafting a malicious file that, when opened by a user, can leak sensitive information from the application's memory. Exploitation requires user interaction, specifically opening a malicious file, and does not allow code execution or system compromise directly. The vulnerability has a medium severity with a CVSS score of 5. 5, reflecting its limited attack vector and impact scope. No known exploits are currently reported in the wild. European organizations using affected versions of Adobe InDesign Desktop, especially in creative industries, could face risks of sensitive data leakage.

AI-Powered Analysis

AILast updated: 01/21/2026, 03:03:45 UTC

Technical Analysis

CVE-2026-21278 is an out-of-bounds read vulnerability classified under CWE-125 affecting Adobe InDesign Desktop versions 21.0, 19.5.5, and earlier. The vulnerability arises when the software improperly handles memory boundaries while processing certain file inputs, leading to the reading of memory locations outside the intended buffer. This can result in exposure of sensitive information stored in memory, such as user data or application internals. The attack requires an attacker to craft a malicious InDesign file that, when opened by a victim, triggers the vulnerability. Since the vulnerability is a read-only flaw, it does not allow modification of memory or code execution, limiting the attacker's capabilities to information disclosure. The CVSS 3.1 base score is 5.5, reflecting a local attack vector (AV:L), low attack complexity (AC:L), no privileges required (PR:N), but requiring user interaction (UI:R). The impact is high on confidentiality (C:H), but no impact on integrity (I:N) or availability (A:N). No patches or exploits are currently publicly available, but the vulnerability is officially published and reserved by Adobe. This vulnerability is particularly relevant for organizations relying on Adobe InDesign for desktop publishing and graphic design, as sensitive project data or intellectual property could be exposed through exploitation.

Potential Impact

For European organizations, especially those in media, publishing, advertising, and design sectors that heavily use Adobe InDesign Desktop, this vulnerability poses a risk of sensitive information leakage. Intellectual property, client data, or confidential project details stored in memory could be exposed if a user opens a maliciously crafted file. While the vulnerability does not allow code execution or system compromise, the confidentiality breach could lead to competitive disadvantages, reputational damage, or compliance issues under GDPR if personal data is involved. The requirement for user interaction reduces the likelihood of widespread automated exploitation but increases risk from targeted phishing or social engineering attacks. Organizations with remote or hybrid workforces may face elevated risk if users handle files from untrusted sources. The absence of known exploits in the wild currently limits immediate impact, but the vulnerability remains a potential vector for espionage or data theft campaigns.

Mitigation Recommendations

1. Monitor Adobe security advisories closely and apply patches or updates as soon as Adobe releases them for affected InDesign Desktop versions. 2. Implement strict email and file handling policies to block or quarantine suspicious or unsolicited InDesign files, especially from unknown sources. 3. Educate users about the risks of opening files from untrusted or unexpected senders and encourage verification before opening. 4. Use endpoint protection solutions capable of detecting anomalous file behaviors or memory access patterns related to InDesign. 5. Employ network segmentation and least privilege principles to limit the exposure of systems running InDesign Desktop. 6. Consider sandboxing or opening untrusted files in isolated environments to prevent potential data leakage. 7. Regularly audit and monitor logs for unusual file access or application crashes that could indicate exploitation attempts.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
adobe
Date Reserved
2025-12-12T22:01:18.188Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69669561a60475309fa56552

Added to database: 1/13/2026, 6:56:33 PM

Last enriched: 1/21/2026, 3:03:45 AM

Last updated: 2/4/2026, 3:09:26 AM

Views: 37

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats