[CIVN-2025-0173] Multiple Vulnerabilities in Adobe Products

By Published On: August 14, 2025

—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA256
Multiple Vulnerabilities in Adobe Products 
Indian – Computer Emergency Response Team (https://www.cert-in.org.in)
Severity Rating: HIGH
Software Affected
Adobe Commerce versions
2.4.9-alpha1
2.4.8-p1 and earlier.
2.4.7-p6 and earlier.
2.4.6-p11 and earlier.
2.4.5-p13 and earlier.
2.4.4-p14 and earlier.
Adobe Commerce B2B versions
1.5.3-alpha1
1.5.2-p1 and earlier.
1.4.2-p6 and earlier.
1.3.5-p11 and earlier.
1.3.4-p13 and earlier.
1.3.3-p14 and earlier.
Magento Open Source versions
2.4.9-alpha1
2.4.8-p1 and earlier.
2.4.7-p6 and earlier.
2.4.6-p11 and earlier.
2.4.5-p13 and earlier.
Adobe Substance 3D Viewer 0.25 and earlier versions
Adobe Animate 2023 23.0.12 and earlier versions for Windows and macOS
Adobe Animate 2024 24.0.09 and earlier versions for Windows and macOS
Adobe Illustrator 2025 29.6.1 and earlier versions for Windows and macOS
Adobe Illustrator 2024 28.7.8 and earlier versions for Windows and macOS
Adobe Photoshop 2025 26.8 and earlier versions for Windows and macOS
Adobe Photoshop 2024 25.12.3 and earlier versions for Windows and macOS
Adobe Substance 3D Modeler 1.22.0 and earlier versions
Adobe Substance 3D Painter 11.0.2 and earlier versions
Adobe Substance 3D Sampler 5.0.3 and earlier versions
Adobe InDesign ID20.4 and earlier versions for Windows and macOS
Adobe InDesign ID19.5.4 and earlier versions for Windows and macOS
Adobe InCopy 20.4 and earlier versions for Windows and macOS
Adobe InCopy¿ 19.5.4 and earlier versions for Windows and macOS
Adobe Substance 3D Stager 3.1.3 and earlier versions for Windows and macOS
Adobe FrameMaker 2020 Release Update 8 and earlier versions for windows
Adobe FrameMaker 2022 Release Update 6 and earlier versions for windows
Adobe Dimension 4.1.3 and earlier versions for Windows and macOS
Overview
Multiple Vulnerabilities have been reported in Adobe products which could be exploited by an attacker to bypass security restrictions, execute arbitrary code, gain elevated privileges, gain access to sensitive information, or cause denial of Service condition on the targeted system.
Target Audience:
System administrators, Security teams or end-users of Adobe creative software products.
Risk Assessment:
High risk unauthorized access to sensitive data and system instability.
Impact Assessment:
Potential for data theft, remote code execution and system crash.
Description
Multiple vulnerabilities exist in Adobe products due to memory corruption, incorrect authorization and other issues.
Successful exploitation of these vulnerabilities could allow an attacker to bypass security restrictions, execute arbitrary code, gain elevated privileges, gain access to sensitive information, or cause denial of Service condition on the targeted system.
Solution
Apply appropriate updates as mentioned in the Adobe Security Bulletin.
https://helpx.adobe.com/security/products/magento/apsb25-71.html
https://helpx.adobe.com/security/products/substance3d-viewer/apsb25-72.html
https://helpx.adobe.com/security/products/animate/apsb25-73.html
https://helpx.adobe.com/security/products/illustrator/apsb25-74.html
https://helpx.adobe.com/security/products/photoshop/apsb25-75.html
https://helpx.adobe.com/security/products/substance3d-modeler/apsb25-76.html
https://helpx.adobe.com/security/products/substance3d_painter/apsb25-77.html
https://helpx.adobe.com/security/products/substance3d-sampler/apsb25-78.html
https://helpx.adobe.com/security/products/indesign/apsb25-79.html
https://helpx.adobe.com/security/products/incopy/apsb25-80.html
https://helpx.adobe.com/security/products/substance3d_stager/apsb25-81.html
https://helpx.adobe.com/security/products/framemaker/apsb25-83.html
https://helpx.adobe.com/security/products/dimension/apsb25-84.html
Vendor Information
Adobe
https://helpx.adobe.com/security.html
References
Adobe
https://helpx.adobe.com/security/products/magento/apsb25-71.html
https://helpx.adobe.com/security/products/substance3d-viewer/apsb25-72.html
https://helpx.adobe.com/security/products/animate/apsb25-73.html
https://helpx.adobe.com/security/products/illustrator/apsb25-74.html
https://helpx.adobe.com/security/products/photoshop/apsb25-75.html
https://helpx.adobe.com/security/products/substance3d-modeler/apsb25-76.html
https://helpx.adobe.com/security/products/substance3d_painter/apsb25-77.html
https://helpx.adobe.com/security/products/substance3d-sampler/apsb25-78.html
https://helpx.adobe.com/security/products/indesign/apsb25-79.html
https://helpx.adobe.com/security/products/incopy/apsb25-80.html
https://helpx.adobe.com/security/products/substance3d_stager/apsb25-81.html
https://helpx.adobe.com/security/products/framemaker/apsb25-83.html
https://helpx.adobe.com/security/products/dimension/apsb25-84.html
CVE Name
CVE-2025-49554
CVE-2025-49555
CVE-2025-49556
CVE-2025-49557
CVE-2025-49558
CVE-2025-49559
CVE-2025-49560
CVE-2025-49561
CVE-2025-49562
CVE-2025-49563
CVE-2025-49564
CVE-2025-49567
CVE-2025-49568
CVE-2025-49569
CVE-2025-49570
CVE-2025-49571
CVE-2025-49572
CVE-2025-49573
CVE-2025-54186
CVE-2025-54187
CVE-2025-54188
CVE-2025-54189
CVE-2025-54190
CVE-2025-54191
CVE-2025-54192
CVE-2025-54193
CVE-2025-54194
CVE-2025-54195
CVE-2025-54197
CVE-2025-54198
CVE-2025-54199
CVE-2025-54200
CVE-2025-54201
CVE-2025-54202
CVE-2025-54203
CVE-2025-54204
CVE-2025-54205
CVE-2025-54206
CVE-2025-54207
CVE-2025-54208
CVE-2025-54209
CVE-2025-54210
CVE-2025-54211
CVE-2025-54212
CVE-2025-54213
CVE-2025-54214
CVE-2025-54215
CVE-2025-54216
CVE-2025-54217
CVE-2025-54218
CVE-2025-54219
CVE-2025-54220
CVE-2025-54221
CVE-2025-54222
CVE-2025-54223
CVE-2025-54224
CVE-2025-54225
CVE-2025-54226
CVE-2025-54227
CVE-2025-54228
CVE-2025-54229
CVE-2025-54230
CVE-2025-54231
CVE-2025-54232
CVE-2025-54233
CVE-2025-54235
CVE-2025-54235
CVE-2025-54238
– —
Thanks and Regards,
CERT-In
Incident Response Help Desk
e-mail: incident@cert-in.org.in
Phone: +91-11-22902657
Toll Free Number: 1800-11-4949
Toll Free Fax : 1800-11-6969
Web: http://www.cert-in.org.in
PGP Fingerprint: A768 083E 4475 5725 B81A A379 2156 C0C0 B620 D0B4
PGP Key information:
https://www.cert-in.org.in/s2cMainServlet?pageid=CONTACTUS
Postal address:
Indian Computer Emergency Response Team (CERT-In)
Ministry of Electronics and Information Technology
Government of India
Electronics Niketan
6, C.G.O. Complex
New Delhi-110 003
—–BEGIN PGP SIGNATURE—–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=oJIg
—–END PGP SIGNATURE—–

Share this article