Vulnerability Description
Acrobat Reader versions 24.001.30356, 26.001.21367 and earlier are affected by an Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Adobe | Acrobat Dc | < 26.001.21411 |
| Adobe | Acrobat Reader Dc | < 26.001.21411 |
| Apple | Macos | - |
| Microsoft | Windows | - |
| Adobe | Acrobat | >= 24.0.0, < 24.001.30362 |
Related Weaknesses (CWE)
References
- https://helpx.adobe.com/security/products/acrobat/apsb26-43.htmlVendor Advisory
- https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2026-US Government Resource
FAQ
What is CVE-2026-34621?
CVE-2026-34621 is a vulnerability with a CVSS score of 8.6 (HIGH). Acrobat Reader versions 24.001.30356, 26.001.21367 and earlier are affected by an Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') vulnerability that could res...
How severe is CVE-2026-34621?
CVE-2026-34621 has been rated HIGH with a CVSS base score of 8.6/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-34621?
Check the references section above for vendor advisories and patch information. Affected products include: Adobe Acrobat Dc, Adobe Acrobat Reader Dc, Apple Macos, Microsoft Windows, Adobe Acrobat.