A critical zero-day vulnerability (CVE-2026-34621) affecting Adobe Acrobat Reader and Adobe Acrobat is actively being exploited, enabling attackers to execute arbitrary code through specially crafted PDF files. The vulnerability is linked to a prototype pollution flaw in the JavaScript engine and impacts both Windows and macOS environments.
Evidence suggests exploitation has been occurring since late 2025, making this a high-risk and active threat. Adobe has released emergency patches, and organizations must prioritize immediate updates, strengthen email and file handling controls, and monitor for suspicious PDF activity.
CVE-2026-34621 originates from a prototype pollution vulnerability within Adobe Acrobat’s JavaScript engine. Prototype pollution allows attackers to modify the base object prototype, injecting malicious properties into otherwise trusted objects and altering application behavior.
In this case, improper handling of user-supplied data within embedded PDF JavaScript enables attackers to manipulate the prototype chain. When a malicious PDF is opened, the embedded script executes within the Acrobat environment and leverages this manipulation to bypass security controls.
This leads to arbitrary code execution on the host system, allowing attackers to deploy additional payloads, compromise endpoints, and potentially gain broader access depending on user privileges and endpoint defences. The vulnerability affects multiple versions across both Windows and macOS and has been observed in real-world exploitation scenarios.
The vulnerability is considered relatively easy to exploit due to minimal user interaction requirements and the widespread use of PDF files in enterprise environments. Attackers only need to convince a user to open a malicious PDF, making phishing and social engineering highly effective delivery mechanisms.
The trusted nature of PDF documents and embedded JavaScript functionality further increases success rates. Since exploitation is already active in the wild, this vulnerability represents a practical and scalable attack vector for threat actors.
CVE-2026-34621 reinforces the ongoing risk posed by document-based attack vectors, especially in widely used applications such as Adobe Acrobat Reader. Active exploitation, combined with ease of delivery and high impact, makes this a critical threat that demands immediate attention.
Organizations must prioritize patching, enhance email and file security controls, and adopt a defense-in-depth approach to reduce exposure and mitigate risk from similar vulnerabilities.
Successful exploitation enables attackers to execute arbitrary code on affected systems, potentially leading to full endpoint compromise. This can result in malware deployment, data exfiltration, credential theft, and lateral movement within enterprise networks.
Given the extensive use of PDF files across business operations, this vulnerability significantly expands the attack surface and increases the likelihood of successful compromise, potentially leading to data breaches, operational disruption, and regulatory consequences.
https://helpx.adobe.com/security/products/acrobat/apsb26-43.html