CVE-2026-34621 - Vulnerability Analysis
HighCVSS: 8.6Last Updated: April 13, 2026
Acrobat Reader - Remote Code Execution
Published: April 11, 2026Updated: April 13, 2026KEVPoC Available
Overview
Acrobat Reader <= 24.001.30356, 26.001.21367 contains a prototype pollution vulnerability caused by improperly controlled modification of object prototype attributes, letting attackers execute arbitrary code in the context of the current user, exploit requires victim to open a malicious file.
Severity & Score
Severity: High
CVSS Score: 8.6
EPSS Score: 759.6%(Probability of exploitation in next 30 days)
Impact
Attackers can execute arbitrary code as the current user, potentially compromising the user's system.
Mitigation
Update to the latest version beyond 26.001.21367.
References
Social Media Activity(1 post)
/r/netsec
@_r_netsec
CVE-2026-34621: Adobe Acrobat Reader zero-day was on VirusTotal for 136 days before Adobe named it a CVE https://nefariousplan.com/posts/adobe-acrobat-cve-2026-34621-detection-lie
View original postGitHub Repositories(5 repos)
Related Resources
Details
- CVE ID
- CVE-2026-34621
- Severity
- High
- CVSS Score
- 8.6
- Type
- prototype_pollution
- Status
- confirmed
- EPSS
- 759.6%
- Social Posts
- 1
CWE
- CWE-1321
CVSS Metrics
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
EPSS Score
759.6%Probability of exploitation in the next 30 days