Patchday: Malicious code gaps in Adobe Acrobat, InDesign & Co. closed

Adobe's developers have closed several vulnerabilities in various products with security updates.

listen Print view
Adobe-Logo an Wand

(Image: r.classen/Shutterstock.com)

1 min. read

Attackers can exploit vulnerabilities in Adobe Acrobat, Commerce, Experince Manager, InCopy, InDesign, Substance 3D Painter and Substance 3D Sampler. Adobe is making updates available for download as part of the June Patchday.

Adobe classifies the majority of the vulnerabilities as critical. For example, attackers can use a vulnerability (CVE-2025-43573 / EUVD-2025-17828, CVSS 7.8, risk "high") in Acrobat and Reader under macOS and Windows to trigger memory errors (Use After Free) in an unspecified way. They can then execute malicious code, which usually leads to the complete compromise of a computer.

Adobe Commerce and Magento Open Source are also vulnerable to malicious code attacks (e.g. CVE-2025-47110 / EUVD-2025-17706, CVSS 9.1, risk "critical"). Attackers can also bypass security functions here (CVE-2025-43585 / EUVD-2025-17708, CVSS 8.2,"high" risk).

Videos by heise

Admins can find further information on the security vulnerabilities and patched versions in the linked warning messages:

(des)

Don't miss any news – follow us on Facebook, LinkedIn or Mastodon.

This article was originally published in German. It was translated with technical assistance and editorially reviewed before publication.