Adobe Security Bulletin

Security Update Available for Adobe InDesign | APSB25-79

Bulletin ID

Date Published

Priority

APSB25-79

August 12, 2025

3

Summary

Adobe has released a security update for Adobe InDesign.  This update addresses critical and important vulnerabilities that could lead to arbitrary code execution and memory leak.

Adobe is not aware of any exploits in the wild for any of the issues addressed in these updates.

Affected Versions

Product

Affected version

Platform

Adobe InDesign

ID20.4 and earlier versions

Windows and macOS 

Adobe InDesign

ID19.5.4 and earlier version.

Windows and macOS 

Solution

Adobe categorizes these updates with the following priority rating and recommends users update their software installations via the Creative Cloud desktop app updater, or by navigating to the InDesign Help menu and clicking "Updates." For more information, please reference this help page.

Product

Updated version

Platform

Priority rating

Adobe InDesign

ID20.5

Windows and macOS 

3

Adobe InDesign

ID19.5.5

Windows and macOS 

 

3

For managed environments, IT administrators can use the Creative Cloud Packager to create deployment packages. Refer to this help page for more information.

Vulnerability Details

Vulnerability Category

Vulnerability Impact

Severity

CVSS base score 

CVE Number

Out-of-bounds Write (CWE-787)

Arbitrary code execution

Critical

7.8


CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

CVE-2025-54206

Access of Uninitialized Pointer (CWE-824)

Arbitrary code execution

Critical

7.8

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

CVE-2025-54207

Out-of-bounds Write (CWE-787)

Arbitrary code execution

Critical

7.8

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

CVE-2025-54208

Heap-based Buffer Overflow (CWE-122)

Arbitrary code execution

Critical

7.8

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

CVE-2025-54209

Out-of-bounds Write (CWE-787)

Arbitrary code execution

Critical

7.8

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

CVE-2025-54210

Heap-based Buffer Overflow (CWE-122)

Arbitrary code execution

Critical

7.8

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

CVE-2025-54211

Heap-based Buffer Overflow (CWE-122)

Arbitrary code execution

Critical

7.8

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

CVE-2025-54212

Out-of-bounds Write (CWE-787)

Arbitrary code execution

Critical

7.8

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

CVE-2025-54213

Use After Free (CWE-416)

 

Arbitrary code execution

Critical

7.8

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

CVE-2025-54224

Use After Free (CWE-416)

 

Arbitrary code execution

Critical

7.8

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

CVE-2025-54225

Use After Free (CWE-416)

 

Arbitrary code execution

Critical

7.8

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

CVE-2025-54226

Out-of-bounds Read (CWE-125)

Memory leak

Important

5.3

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N

CVE-2025-54214

Out-of-bounds Read (CWE-125)

Memory leak

Important

5.5


CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N

CVE-2025-54227

Out-of-bounds Read (CWE-125)

Memory leak

Important

5.5


CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N

CVE-2025-54228

Acknowledgments

Adobe would like to thank the following researchers for reporting these issues and for working with Adobe to help protect our customers:   

  • Francis Provencher (prl) -- CVE-2025-54207, CVE-2025-54214, CVE-2025-54227, CVE-2025-54228
  • Jony (jony_juice) -- CVE-2025-54211, CVE-2025-54212
  • yjdfy -- CVE-2025-54206, CVE-2025-54208, CVE-2025-54209, CVE-2025-54210, CVE-2025-54213, CVE-2025-54224, CVE-2025-54225, CVE-2025-54226

NOTE: Adobe has a public bug bounty program with HackerOne. If you are interested in working with Adobe as an external security researcher, please check out https://hackerone.com/adobe


For more information, visit https://helpx.adobe.com/security.html, or email PSIRT@adobe.com

Adobe, Inc.

Get help faster and easier

New user?