CVE-2026-34632
Received Received - Intake
Uncontrolled Search Path Vulnerability in Adobe Photoshop Installer

Publication date: 2026-04-15

Last updated on: 2026-04-22

Assigner: Adobe Systems Incorporated

Description
Adobe Photoshop Installer was affected by an Uncontrolled Search Path Element vulnerability that could have resulted in arbitrary code execution in the context of the current user. A low-privileged local attacker could have exploited this vulnerability by manipulating the search path used by the application to locate critical resources, potentially causing unauthorized code execution. Exploitation of this issue required user interaction in that a user had to be running the installer.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-15
Last Modified
2026-04-22
Generated
2026-05-07
AI Q&A
2026-04-15
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
adobe photoshop_installer *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-427 The product uses a fixed or controlled search path to find resources, but one or more locations in that path can be under the control of unintended actors.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2026-34632 is an Uncontrolled Search Path Element vulnerability affecting the Adobe Photoshop Installer. This means the installer uses a search path to locate critical resources, but that path can be manipulated by a low-privileged local attacker. By altering the search path, the attacker can cause the installer to load and execute unauthorized code in the context of the current user. Exploitation requires that a user is running the installer and involves manipulating directories or environment variables that the installer trusts to find its resources.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

CVE-2026-34632 allows unauthorized code execution through manipulation of search paths in the Adobe Photoshop Installer. This can lead to unauthorized access, modification, or disruption of data and system resources.

Such unauthorized code execution and potential data compromise can negatively impact compliance with standards and regulations like GDPR and HIPAA, which require protection of data confidentiality, integrity, and availability.

Exploitation of this vulnerability could result in breaches of sensitive personal or health information, thereby violating regulatory requirements for data protection and potentially leading to legal and financial consequences.


How can this vulnerability impact me? :

This vulnerability can lead to arbitrary code execution with the privileges of the current user running the Adobe Photoshop Installer. An attacker with low privileges on the local system could exploit this by manipulating the search path, potentially causing unauthorized code to run. This can compromise the confidentiality, integrity, and availability of the affected system, allowing the attacker to execute malicious actions such as installing malware, stealing data, or disrupting system operations.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

Detection of this vulnerability involves identifying if the Adobe Photoshop Installer or related processes are using uncontrolled or writable directories in their search paths for critical resources such as DLLs or executables.

On Windows systems, you can check the search path environment variables and the directories from which the installer loads resources. Look for suspicious directories like writable folders, network shares (SMB, WebDAV), or the current working directory being included in the search path.

Suggested commands include:

  • Using PowerShell to check the PATH environment variable: `echo $Env:PATH`
  • Listing loaded DLLs for the installer process to see if any are loaded from unexpected locations (using tools like Process Explorer or `Get-Process` in PowerShell).
  • Checking directory permissions on folders included in the search path to identify writable or untrusted directories.

On Unix-like systems, check for empty elements in the PATH variable or the presence of '.' (current directory) in the PATH by running: `echo $PATH` and inspecting for unsafe entries.


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include controlling and sanitizing the search paths used by the Adobe Photoshop Installer to prevent loading resources from untrusted or writable directories.

  • Ensure that the installer uses fully qualified paths when loading executables or DLLs, avoiding reliance on relative or environment-dependent search paths.
  • Remove or restrict environment variables such as PATH and LD_LIBRARY_PATH before running the installer to exclude unsafe directories.
  • Avoid including writable or network share directories in the search path.
  • Use tools or configurations to hard-code search paths to known safe directories.
  • Educate users to avoid running the installer from untrusted locations or directories that may be writable by low-privileged users.

Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart