Bulletin ID
Security update available for Adobe Connect | APSB26-37
|
|
Date Published |
Priority |
|---|---|---|
|
APSB26-37 |
April 14, 2026 |
3 |
Summary
Affected Product Versions
|
Product |
Version |
Platform |
|---|---|---|
|
Adobe Connect |
12.10 and earlier |
Windows and macOS |
|
Adobe Connect Desktop Application |
2025.3 and earlier |
Windows and macOS |
Solution
Adobe categorizes these updates with the following priority ratings and recommends users update their installation to the latest version.
|
Product |
Version |
Platform |
Priority |
Availability |
|---|---|---|---|---|
|
Adobe Connect |
12.11 |
Windows and macOS |
3 |
|
|
Adobe Connect Desktop Application |
2025.9 |
Windows |
3 |
Vulnerability Details
|
Vulnerability Category |
Vulnerability Impact |
Severity |
CVSS base score |
CVE Number |
|
|---|---|---|---|---|---|
|
Deserialization of Untrusted Data (CWE-502) |
Arbitrary code execution |
Critical |
9.6 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H |
CVE-2026-27302 |
|
Deserialization of Untrusted Data (CWE-502) |
Arbitrary code execution |
Critical |
9.6 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H |
CVE-2026-27303 |
|
Cross-site Scripting (Reflected XSS) (CWE-79) |
Arbitrary code execution |
Critical |
9.3 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N |
CVE-2026-27243 |
|
Cross-site Scripting (Reflected XSS) (CWE-79) |
Arbitrary code execution |
Critical |
9.3 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N |
CVE-2026-27245 |
|
Cross-site Scripting (DOM-based XSS) (CWE-79) |
Arbitrary code execution |
Critical |
9.3 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N |
CVE-2026-27246 |
|
Deserialization of Untrusted Data (CWE-502) |
Arbitrary code execution |
Critical |
9.3 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N |
CVE-2026-34615 |
|
Cross-site Scripting (XSS) (CWE-79) |
Privilege escalation |
Critical |
9.6 |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N |
CVE-2026-34617 |
|
Cross-site Scripting (Reflected XSS) (CWE-79) |
Arbitrary code execution |
Important |
6.1 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N |
CVE-2026-21331 |
|
Cross-site Scripting (Reflected XSS) (CWE-79) |
Arbitrary code execution |
Important |
6.1 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N |
CVE-2026-34614 |
Acknowledgments
Adobe would like to thank the following researchers for reporting these issue and for working with Adobe to help protect our customers:
- Laish (a_l) -- CVE-2026-27302, CVE-2026-27303, CVE-2026-34615
- yjdfy -- CVE-2026-21331, CVE-2026-34614
- green-jam -- CVE-2026-27243, CVE-2026-27245, CVE-2026-27246
- remot3 -- CVE-2026-34617
NOTE: Adobe has a public bug bounty program with HackerOne. If you are interested in working with Adobe as an external security researcher, please check out https://hackerone.com/adobe.
For more information, visit https://helpx.adobe.com/security.html, or email PSIRT@adobe.com.