Adobe Security Bulletin

Security update available for Adobe Connect  | APSB26-37

Bulletin ID

Date Published

Priority

APSB26-37

April 14, 2026

3

Summary

Adobe has released a security update for Adobe Connect. This update resolves critical and important vulnerabilities that could lead to arbitrary code execution and privilege escalation. 

Adobe is not aware of any exploits in the wild for any of the issues addressed in these updates.

Affected Product Versions

Product

Version

Platform

Adobe Connect

12.10 and earlier            

Windows and macOS

Adobe Connect Desktop Application

2025.3 and earlier

Windows and macOS

Solution

Adobe categorizes these updates with the following  priority ratings and recommends users update their installation to the latest version.

Product

Version

Platform

Priority

Availability

Adobe Connect

12.11

Windows and macOS

3

Adobe Connect Desktop Application

2025.9

Windows

3

Vulnerability Details

Vulnerability Category

Vulnerability Impact

Severity

CVSS base score 

CVE Number

Deserialization of Untrusted Data (CWE-502)

Arbitrary code execution

Critical

9.6

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H

CVE-2026-27302

Deserialization of Untrusted Data (CWE-502)

Arbitrary code execution

Critical

9.6

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H

CVE-2026-27303

Cross-site Scripting (Reflected XSS) (CWE-79)

Arbitrary code execution

Critical

9.3

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N

CVE-2026-27243

Cross-site Scripting (Reflected XSS) (CWE-79)

Arbitrary code execution

Critical

9.3

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N

CVE-2026-27245

Cross-site Scripting (DOM-based XSS) (CWE-79)

Arbitrary code execution

Critical

9.3

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N

CVE-2026-27246

Deserialization of Untrusted Data (CWE-502)

Arbitrary code execution

Critical

9.3

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N

CVE-2026-34615

Cross-site Scripting (XSS) (CWE-79)

Privilege escalation

Critical

9.6

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N

CVE-2026-34617

Cross-site Scripting (Reflected XSS) (CWE-79)

Arbitrary code execution

Important

6.1

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

CVE-2026-21331

Cross-site Scripting (Reflected XSS) (CWE-79)

Arbitrary code execution

Important

6.1

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

CVE-2026-34614

Acknowledgments

Adobe would like to thank the following researchers for reporting these issue and for working with Adobe to help protect our customers:   

  • Laish (a_l) -- CVE-2026-27302, CVE-2026-27303, CVE-2026-34615
  • yjdfy -- CVE-2026-21331, CVE-2026-34614
  • green-jam -- CVE-2026-27243, CVE-2026-27245, CVE-2026-27246
  • remot3 -- CVE-2026-34617

NOTE: Adobe has a public bug bounty program with HackerOne. If you are interested in working with Adobe as an external security researcher, please check out https://hackerone.com/adobe.


For more information, visit https://helpx.adobe.com/security.html, or email PSIRT@adobe.com.

Adobe, Inc.

Get help faster and easier

New user?