Cyber Security

Multiple Adobe Enterprise products Vulnerable To Code Execution

Multiple Adobe Enterprise products such as Adobe Experience, Premier Pro, ColdFusion, Bridge, Lightroom, and Animate have been discovered with critical code execution vulnerabilities that were associated with Untrusted search path, Cross-site scripting, Out-of-bounds write, Use After free, Heap-based buffer overflow and many others.

Adobe has released multiple security advisories to address these vulnerabilities.

Among all of these products, Adobe Experience Manager had the highest number of vulnerabilities, accounting for 43 code execution vulnerabilities associated with Improper access control and cross-site scripting.

Vulnerability Analysis

According to the reports shared with Cyber Security News, successfully exploiting these vulnerabilities in any Adobe product will lead to arbitrary code execution, allowing a threat actor to perform any malicious activity on the compromised product.

Adobe Animate

This product had four vulnerabilities, three of which were related to memory leaks and one associated with arbitrary code execution (CVE-2024-20761).

This vulnerability exists due to an Out-of-bounds write condition on the Adobe Animate product, which a threat actor could exploit to perform write actions at the end or beginning of the intended buffer.

This vulnerability was given a severity of 7.8 (High).

Adobe Lightroom

This product had only one vulnerability, which was related to arbitrary code execution that exists due to an Untrusted search path.

This vulnerability was assigned with CVE-2024-20754, and its severity has yet to be categorized.

A threat actor could exploit this vulnerability and achieve code execution over the affected product.

Adobe Bridge

This product was discovered with four vulnerabilities in three of which were linked with arbitrary code execution vulnerabilities that existed due to Use after free, heap-based buffer overflow and Out-of-bounds write conditions on the vulnerable products. 

These vulnerabilities were assigned with CVE-2024-20752 (7.8 – High), CVE-2024-20755 (7.8 – High), and CVE-2024-20756 (8.6 – High). 

Adobe ColdFusion

This product was discovered with only one vulnerability that was related to Arbitrary file system read due to improper access control. However, there were no arbitrary code executions present in this product.

The only vulnerability was assigned with CVE-2024-20767 and the severity was given as 8.2 (High). 

Adobe Premiere Pro

This product was discovered with two vulnerabilities both of which were related to arbitrary code execution due to Heap-based buffer overflow and Out-of-bounds write conditions.

These vulnerabilities were assigned with CVE-2024-20745 (7.8 – High) and CVE-2024-20746 (7.8 – High). 

Adobe Experience Manager

As mentioned earlier, this product was the only product with the highest number of vulnerabilities. There were 43 arbitrary code execution vulnerabilities and 3 security bypass vulnerabilities. 

All of the code execution vulnerabilities existed due to Cross-site scripting.

Among the three security bypass vulnerabilities, two of them were due to improper input validation and the other was due to improper access control.

Vulnerability CategoryVulnerability ImpactSeverityCVSS base scoreCVSS vectorCVE Number
Cross-site Scripting (Stored XSS) (CWE-79)Arbitrary code executionImportant5.4CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:NCVE-2024-26028
Cross-site Scripting (Stored XSS) (CWE-79)Arbitrary code executionImportant5.4CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:NCVE-2024-26030
Cross-site Scripting (Stored XSS) (CWE-79)Arbitrary code executionImportant5.4CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:NCVE-2024-26031
Cross-site Scripting (Stored XSS) (CWE-79)Arbitrary code executionImportant5.4CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:NCVE-2024-26032
Cross-site Scripting (Stored XSS) (CWE-79)Arbitrary code executionImportant5.4CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:NCVE-2024-26033
Cross-site Scripting (Stored XSS) (CWE-79)Arbitrary code executionImportant5.4CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:NCVE-2024-26034
Cross-site Scripting (Stored XSS) (CWE-79)Arbitrary code executionImportant5.4CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:NCVE-2024-26035
Cross-site Scripting (Stored XSS) (CWE-79)Arbitrary code executionImportant5.4CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:NCVE-2024-26038
Cross-site Scripting (Stored XSS) (CWE-79)Arbitrary code executionImportant5.4CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:NCVE-2024-26040
Cross-site Scripting (Stored XSS) (CWE-79)Arbitrary code executionImportant5.4CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:NCVE-2024-26041
Cross-site Scripting (Stored XSS) (CWE-79)Arbitrary code executionImportant5.4CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:NCVE-2024-26042
Cross-site Scripting (Stored XSS) (CWE-79)Arbitrary code executionImportant5.4CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:NCVE-2024-26043
Cross-site Scripting (Stored XSS) (CWE-79)Arbitrary code executionImportant5.4CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:NCVE-2024-26044
Cross-site Scripting (Stored XSS) (CWE-79)Arbitrary code executionImportant5.4CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:NCVE-2024-26045
Cross-site Scripting (Stored XSS) (CWE-79)Arbitrary code executionImportant4.7CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:LCVE-2024-26048
Cross-site Scripting (Stored XSS) (CWE-79)Arbitrary code executionImportant4.5CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:N/A:NCVE-2024-26050
Cross-site Scripting (Stored XSS) (CWE-79)Arbitrary code executionImportant5.4CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:NCVE-2024-26052
Cross-site Scripting (Stored XSS) (CWE-79)Arbitrary code executionImportant5.4CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:NCVE-2024-26056
Cross-site Scripting (Stored XSS) (CWE-79)Arbitrary code executionImportant5.4CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:NCVE-2024-26059
Cross-site Scripting (Stored XSS) (CWE-79)Arbitrary code executionImportant5.4CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:NCVE-2024-26061
Cross-site Scripting (Stored XSS) (CWE-79)Arbitrary code executionImportant5.4CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:NCVE-2024-26062
Information Exposure (CWE-200)Security feature bypassImportant5.3CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:NCVE-2024-26063
Cross-site Scripting (Stored XSS) (CWE-79)Arbitrary code executionImportant5.4CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:NCVE-2024-26064
Cross-site Scripting (Stored XSS) (CWE-79)Arbitrary code executionImportant5.4CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:NCVE-2024-26065
Cross-site Scripting (Stored XSS) (CWE-79)Arbitrary code executionImportant5.4CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:NCVE-2024-26067
Cross-site Scripting (Stored XSS) (CWE-79)Arbitrary code executionImportant5.4CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:NCVE-2024-26069
Cross-site Scripting (Stored XSS) (CWE-79)Arbitrary code executionImportant5.4CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:NCVE-2024-26073
Cross-site Scripting (Stored XSS) (CWE-79)Arbitrary code executionImportant5.4CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:NCVE-2024-26080
Cross-site Scripting (Stored XSS) (CWE-79)Arbitrary code executionImportant5.4CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:NCVE-2024-26094
Cross-site Scripting (Stored XSS) (CWE-79)Arbitrary code executionImportant5.4CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:NCVE-2024-26096
Cross-site Scripting (Stored XSS) (CWE-79)Arbitrary code executionImportant5.4CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:NCVE-2024-26102
Cross-site Scripting (Stored XSS) (CWE-79)Arbitrary code executionImportant5.4CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:NCVE-2024-26103
Cross-site Scripting (Stored XSS) (CWE-79)Arbitrary code executionImportant5.4CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:NCVE-2024-26104
Cross-site Scripting (Stored XSS) (CWE-79)Arbitrary code executionImportant5.4CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:NCVE-2024-26105
Cross-site Scripting (Stored XSS) (CWE-79)Arbitrary code executionImportant5.4CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:NCVE-2024-26106
Cross-site Scripting (Stored XSS) (CWE-79)Arbitrary code executionImportant5.3CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:NCVE-2024-26107
Cross-site Scripting (Stored XSS) (CWE-79)Arbitrary code executionImportant5.4CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:NCVE-2024-26118
Improper Access Control (CWE-284)Security feature bypassImportant5.3CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:NCVE-2024-26119
Cross-site Scripting (Stored XSS) (CWE-79)Arbitrary code executionImportant5.4CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:NCVE-2024-26120
Cross-site Scripting (Stored XSS) (CWE-79)Arbitrary code executionImportant5.4CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:NCVE-2024-26124
Cross-site Scripting (Stored XSS) (CWE-79)Arbitrary code executionImportant5.4CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:NCVE-2024-26125
Cross-site Scripting (Stored XSS) (CWE-79)Arbitrary code executionImportant5.4CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:NCVE-2024-20760
Cross-site Scripting (Stored XSS) (CWE-79)Arbitrary code executionImportant5.4CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:NCVE-2024-20768
Improper Input Validation (CWE-20)Security feature bypassModerate3.5CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:NCVE-2024-26126
Improper Input Validation (CWE-20)Security feature bypassModerate3.5CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:NCVE-2024-26127
Cross-site Scripting (Stored XSS) (CWE-79)Arbitrary code executionModerate3.4CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:N/A:NCVE-2024-26051
Source: Adobe

Affected Products

Affected ProductVersionPlatform
Adobe Animate 202323.0.3 and earlier versionsWindows and macOS
Adobe Animate 202424.0 and earlier versionsWindows and macOS
Lightroom 7.1.2 and earlier versions macOS
Adobe Bridge 13.0.5 and earlier versions Windows  and macOS
Adobe Bridge 14.0.1 and earlier versions Windows  and macOS
ColdFusion 2023Update 6 and earlier versionsAll
ColdFusion 2021Update 12 and earlier versionsAll
Adobe Premiere Pro 24.1 and earlier versionsWindows and macOS
Adobe Premiere Pro 23.6.2 and earlier versionsWindows and macOS
Adobe Experience Manager (AEM)AEM Cloud Service (CS)All
6.5.19.0 and earlier versions All

Fixed In Versions

ProductVersionPlatformPriorityAvailability
Adobe Animate  2023 23.0.4Windows and macOS3Download Center
Adobe Animate  2024 24.0.1Windows and macOS3Download Center
Lightroom 7.2macOS as published in the Apple App Store. 3Download Center
Adobe Bridge 13.0.6Windows and macOS 3Download Page
Adobe Bridge 14.0.2Windows and macOS 3Download Page
ColdFusion 2023Update 7All3Tech Note
ColdFusion 2021Update 13All3Tech Note
Adobe Premiere Pro24.2.1Windows and macOS3Download Center
Adobe Premiere Pro23.6.4Windows and macOS3Download Center
Adobe Experience Manager (AEM) AEM Cloud Service Release 2024.03 All3Release Notes
6.5.20.0All3AEM 6.5 Service Pack Release Notes

With Perimeter81 malware protection, you can block malware, including Trojans, ransomware, spyware, rootkits, worms, and zero-day exploits. All are incredibly harmful and can wreak havoc on your network.

Stay updated on Cybersecurity news, Whitepapers, and Infographics. Follow us on LinkedIn & Twitter.

Guru Baran

Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Recent Posts

New TEE.fail Attack Breaks Trusted Environments to Exfiltrate Secrets from Intel and AMD DDR5 Environments

A groundbreaking security vulnerability has emerged that fundamentally challenges the integrity of modern trusted execution…

5 minutes ago

Sweet Security Brings Runtime-CNAPP Power to Windows

Tel Aviv, Israel, October 29th, 2025, CyberNewsWire Sweet Security Brings Runtime-CNAPP Power to Windows Sweet…

10 minutes ago

AWS US-EAST-1 Region Experiences Delays in EC2 Instance Deployments

Amazon Web Services encountered significant operational challenges in its US-EAST-1 region on October 28, 2025,…

18 minutes ago

WordPress Plugin Vulnerability Exposes 7 Million Sites to XSS Attack

A critical cross-site scripting (XSS) vulnerability has been discovered in the popular LiteSpeed Cache plugin…

38 minutes ago

Hikvision Exploiter – An Automated Exploitation Toolkit Targeting Hikvision IP Cameras

A new open-source tool called HikvisionExploiter has emerged, designed to automate attacks on vulnerable Hikvision…

49 minutes ago

10 Malicious npm Packages with Auto-Run Feature on Install Deploys Multi-Stage Credential Harvester

The npm ecosystem faces a sophisticated new threat as ten malicious packages have emerged, each…

2 hours ago