Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2026-34622— Acrobat Reader | Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') (CWE-1321)

CVSS 8.6 · High EPSS 0.24% · P46
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2026-34622

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Acrobat Reader | Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') (CWE-1321)
Source: NVD (National Vulnerability Database)
Vulnerability Description
Acrobat Reader versions 26.001.21411, 24.001.30360, 24.001.30362 and earlier are affected by an Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
Source: NVD (National Vulnerability Database)
Vulnerability Type
CWE-1321
Source: NVD (National Vulnerability Database)
Vulnerability Title
Adobe Acrobat Reader 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Adobe Acrobat Reader是美国奥多比(Adobe)公司的一款PDF查看器。该软件用于打印,签名和注释 PDF。 Adobe Acrobat Reader 26.001.21411及之前版本、24.001.30360及之前版本和24.001.30362及之前版本存在安全漏洞,该漏洞源于原型污染,可能导致在当前用户环境下执行任意代码。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
AdobeAcrobat Reader 0 ~ 26.001.21411 -

II. Public POCs for CVE-2026-34622

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2026-34622

登录查看更多情报信息。

Same Patch Batch · Adobe · 2026-04-14 · 52 CVEs total

CVE-2026-273039.6 CRITICALAdobe Connect | Deserialization of Untrusted Data (CWE-502)
CVE-2026-272469.3 CRITICALAdobe Connect | Cross-site Scripting (DOM-based XSS) (CWE-79)
CVE-2026-272459.3 CRITICALAdobe Connect | Cross-site Scripting (Reflected XSS) (CWE-79)
CVE-2026-346159.3 CRITICALAdobe Connect | Deserialization of Untrusted Data (CWE-502)
CVE-2026-272439.3 CRITICALAdobe Connect | Cross-site Scripting (Reflected XSS) (CWE-79)
CVE-2026-273049.3 CRITICALColdFusion | Improper Input Validation (CWE-20)
CVE-2026-346178.7 HIGHAdobe Connect | Cross-site Scripting (XSS) (CWE-79)
CVE-2026-272908.6 HIGHAdobe Framemaker | Untrusted Search Path (CWE-426)
CVE-2026-273058.6 HIGHColdFusion | Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal'
CVE-2026-273068.4 HIGHColdFusion | Improper Input Validation (CWE-20)
CVE-2026-273137.8 HIGHBridge | Heap-based Buffer Overflow (CWE-122)
CVE-2026-273127.8 HIGHBridge | Heap-based Buffer Overflow (CWE-122)
CVE-2026-272897.8 HIGHPhotoshop Desktop | Out-of-bounds Read (CWE-125)
CVE-2026-273117.8 HIGHBridge | Heap-based Buffer Overflow (CWE-122)
CVE-2026-346297.8 HIGHInDesign Desktop | Heap-based Buffer Overflow (CWE-122)
CVE-2026-346287.8 HIGHInDesign Desktop | Heap-based Buffer Overflow (CWE-122)
CVE-2026-346187.8 HIGHIllustrator | Out-of-bounds Write (CWE-787)
CVE-2026-273107.8 HIGHBridge | Heap-based Buffer Overflow (CWE-122)
CVE-2026-346277.8 HIGHInDesign Desktop | Heap-based Buffer Overflow (CWE-122)
CVE-2026-346317.8 HIGHInCopy | Out-of-bounds Write (CWE-787)

Showing top 20 of 52 CVEs. View all on vendor page → →

IV. Related Vulnerabilities

V. Comments for CVE-2026-34622

No comments yet


Leave a comment