Skip to content

CVE-2026-34621: Acrobat Reader Prototype Pollution

CVE-2026-34621 is a critical vulnerability (CVSS 9.6) in Adobe Acrobat Reader, identified as an Improperly Controlled Modification of Object Prototype Attributes, commonly referred to as Prototype Pollution. An attacker can leverage this flaw to execute arbitrary code by enticing a user to open a malicious PDF file.

The vulnerability originates from the internal JavaScript engine of Acrobat Reader. By manipulating the object prototype, an attacker can override native properties or methods. This leads to an unstable state where the execution flow can be redirected to arbitrary memory addresses, ultimately resulting in Arbitrary Code Execution (ACE) under the privileges of the victim.

Exploitation requires user interaction: the victim must open a crafted PDF file. There is currently no widely available public exploit code, but the high CVSS score indicates a significant risk of future weaponization.

  • No specific file hashes are currently available.
  • Monitoring for abnormal behavior of Acrobat Reader processes (Acrobat.exe) during PDF parsing is recommended.
  • Watch for unusual JavaScript activity or attempts to redefine native JS objects.
index=endpoint process_name="Acrobat.exe"
| search "prototype" OR "constructor" OR "defineProperties"
| stats count by file_name, user_id