CVE-2026-21272:
Dreamweaver Desktop versions 21.6 and earlier contain an Improper Input Validation vulnerability allowing arbitrary file system write, potentially leading to data manipulation or injection.
Score
A numerical rating that indicates how dangerous this vulnerability is.
8.6High- Published Date:Jan 13, 2026
- CISA KEV Date:*No Data*
- Industries Affected:20
Threat Predictions
- EPSS Score:0.0
- EPSS Percentile:13%
Exploitability
- Score:1.8
- Attack Vector:LOCAL
- Attack Complexity:LOW
- Privileges Required:NONE
- User Interaction:REQUIRED
- Scope:CHANGED
Impact
- Score:6.0
- Confidentiality Impact:HIGH
- Integrity Impact:HIGH
- Availability Impact:HIGH
Description Preview
Dreamweaver Desktop versions 21.6 and earlier contain an Improper Input Validation vulnerability allowing arbitrary file system write, potentially leading to data manipulation or injection.
Overview
The vulnerability in Adobe Dreamweaver Desktop is classified as an Improper Input Validation issue (CWE-20). It affects versions 21.6 and earlier of the software. The flaw allows an attacker to write arbitrarily to the file system, potentially leading to data manipulation or injection of malicious content. Exploitation requires user interaction, as the victim must open a malicious file. The vulnerability's scope is changed, indicating that it can affect resources beyond its original security context. With a CVSS v3.1 score of 8.6, it is considered high severity, posing significant risks to system integrity, confidentiality, and availability.
Remediation
- To mitigate the risks associated with this vulnerability, users and administrators should take the following steps:
- 1. Update Adobe Dreamweaver Desktop to the latest version as soon as it becomes available.
- 2. Implement the principle of least privilege for user accounts that utilize Dreamweaver.
- 3. Educate users about the risks of opening untrusted files or documents.
- 4. Implement and maintain robust security measures such as up-to-date antivirus software and firewalls.
- 5. Monitor system activities and logs for any suspicious behavior.
- 6. Apply any additional security patches or updates recommended by Adobe.
References
Industries Affected
Below is a list of industries most commonly impacted or potentially at risk based on intelligence.