LeakyCreds
NewInstant webhook alerts now available — notified within seconds of any credential detection.Learn more →
Home / Vulnerability Intelligence / CVE-2026-34621

CVE-2026-34621 - Vulnerability Analysis

HighCVSS: 8.6

Last Updated: April 13, 2026

Acrobat Reader - Remote Code Execution

Published: April 11, 2026Updated: April 13, 2026KEVPoC Available

Overview

Acrobat Reader <= 24.001.30356, 26.001.21367 contains a prototype pollution vulnerability caused by improperly controlled modification of object prototype attributes, letting attackers execute arbitrary code in the context of the current user, exploit requires victim to open a malicious file.

Severity & Score

Severity: High
CVSS Score: 8.6
EPSS Score: 759.6%(Probability of exploitation in next 30 days)

Impact

Attackers can execute arbitrary code as the current user, potentially compromising the user's system.

Mitigation

Update to the latest version beyond 26.001.21367.

Social Media Activity(1 post)

/r/netsec
/r/netsec
@_r_netsec
Apr 23, 2026

CVE-2026-34621: Adobe Acrobat Reader zero-day was on VirusTotal for 136 days before Adobe named it a CVE https://nefariousplan.com/posts/adobe-acrobat-cve-2026-34621-detection-lie

View original post

Details

CVE ID
CVE-2026-34621
Severity
High
CVSS Score
8.6
Type
prototype_pollution
Status
confirmed
EPSS
759.6%
Social Posts
1

CWE

  • CWE-1321

CVSS Metrics

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H

EPSS Score

759.6%Probability of exploitation in the next 30 days