Prototype Pollution Vulnerability in Adobe Acrobat Reader
CVE-2026-34621
Key Information:
- Vendor
Adobe
- Status
- Vendor
- CVE Published:
- 11 April 2026
Badges
What is CVE-2026-34621?
CVE-2026-34621 is a significant vulnerability found in Adobe Acrobat Reader, a widely used application for viewing, creating, and editing PDF documents. This vulnerability stems from an improperly controlled modification of object prototype attributes, known as Prototype Pollution. If successfully exploited, it allows for arbitrary code execution within the context of the user running the application. To trigger this vulnerability, a user must interact with the system by opening a malicious PDF file, which poses a risk particularly in environments where users may inadvertently open untrusted documents. Given the widespread use of Acrobat Reader in organizations, this vulnerability presents a considerable threat, as it can lead to unauthorized access and manipulation of sensitive data or system resources.
Potential impact of CVE-2026-34621
-
Arbitrary Code Execution: The most critical impact of this vulnerability is the potential for arbitrary code execution. Attackers can exploit this flaw to execute malicious code in the context of the current user, which can lead to a complete compromise of the individual's session and potentially the wider network.
-
Data Breach and Sensitive Information Exposure: Successful exploitation of this vulnerability can lead to unauthorized access to sensitive information stored on the affected machine. This could result in data theft, integrity violations, and exposure of confidential organizational data to malicious actors.
-
Increased Risk of Malware Infection: By allowing arbitrary code execution, this vulnerability enables the installation of various forms of malware, including ransomware. While direct exploitations of this vulnerability have not been reported, the potential for creating further vulnerabilities or backdoors in an organization's systems is significant, increasing overall cybersecurity risk.
CISA has reported CVE-2026-34621
CISA provides regional cyber and physical services to support security and resilience across the United States. CISA monitor the most dangerious vulnerabilities and have identifed CVE-2026-34621 as being exploited but is not known by the CISA to be used in ransomware campaigns. This is subject to change at pace as recent news articles suggest the vulnerability is being used by ransomware groups.
The CISA's recommendation is: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.
Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.
Affected Version(s)
Acrobat Reader 0 <= 26.001.21367
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
News Articles
Week in review: Acrobat Reader flaw exploited, Claude Mythos offensive capabilities and limits - Help Net Security
Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Bringing governance and visibility to machine and AI
2 weeks ago
Week In Review: Acrobat Reader Flaw Exploited, Claude Mythos Offensive Capabilities And Limits - Help Net Security
Here’s an overview of some of last week’s most interesting news, articles, interviews and videos:
2 weeks ago
Adobe Patches Exploited Zero-Day That Lingered for Months
An attacker has been using maliciously crafted PDF files to exploit a zero-day in Adobe Acrobat and Reader for at least four months.
3 weeks ago
References
EPSS Score
7% chance of being exploited in the next 30 days.
CVSS V3.1
Timeline
- 🟡
Public PoC available
- 📈
Vulnerability started trending
- 💰
Used in Ransomware
- 🦅
CISA Reported
- 👾
Exploit known to exist
- 📰
First article discovered by The Hacker News
Vulnerability published
Vulnerability Reserved