Adobe Security Bulletin

Security Updates Available for Adobe Bridge | APSB26-39

Bulletin ID

Date Published

Priority

APSB26-39

April 14, 2026

3

Summary

Adobe has released a security update for Adobe Bridge. This update addresses critical and important vulnerabilities that could lead to arbitrary code execution and application denial-of-service.

 Adobe is not aware of any exploits in the wild for any of the issues addressed in these updates.

Affected Versions

Product

Version

Platform

Adobe Bridge  

15.1.4 (LTS) and earlier versions

 

Windows  and macOS

Adobe Bridge  

16.0.2 and earlier versions

 

Windows  and macOS

Solution

Adobe categorizes these updates with the following priority ratings and recommends users update their installation to the newest version via the Creative Cloud desktop app's update mechanism.  For more information, please reference this help page.   

Product

Version

Platform

Priority   

Availability    

Adobe Bridge  

15.1.5 (LTS)

 

Windows and macOS    

3

Adobe Bridge  

16.0.3

 

Windows and macOS    

3

Vulnerability Details

Vulnerability Category

Vulnerability Impact

Severity

CVSS base score

CVE Numbers

Heap-based Buffer Overflow (CWE-122)

Arbitrary code execution

Critical

7.8

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

CVE-2026-27309

Heap-based Buffer Overflow (CWE-122)

Arbitrary code execution

Critical

7.8

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

CVE-2026-27310

Heap-based Buffer Overflow (CWE-122)

Arbitrary code execution

Critical

7.8

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

CVE-2026-27311

Heap-based Buffer Overflow (CWE-122)

Arbitrary code execution

Critical

7.8

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

CVE-2026-27312

Heap-based Buffer Overflow (CWE-122)

Arbitrary code execution

Critical

7.8

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

CVE-2026-27313

Divide By Zero (CWE-369)

Application denial-of-service

Important

5.5

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H

CVE-2026-27222

Acknowledgments

Adobe would like to thank the following researcher for reporting this issue and for working with Adobe to help protect our customers:   

  • Francis Provencher (prl) -- CVE-2026-27309, CVE-2026-27310, CVE-2026-27311, CVE-2026-27312, CVE-2026-27313, CVE-2026-27222

NOTE: Adobe has a public bug bounty program with HackerOne. If you are interested in working with Adobe as an external security researcher, please check out https://hackerone.com/adobe


For more information, visit https://helpx.adobe.com/security.html, or email PSIRT@adobe.com

Adobe, Inc.

Get help faster and easier

New user?