Description
Multiple vulnerabilities were found in Adobe Acrobat Reader. Malicious users can exploit these vulnerabilities to bypass security restrictions, execute arbitrary code.
Below is a complete list of vulnerabilities:
- Security bypass vulnerability in Security Design Principles can be exploited to bypass security restrictions
- Use After Free vulnerability can be exploited remotely to execute arbitrary code
Original advisories
Exploitation
Public exploits exist for this vulnerability.
Related products
CVE list
- CVE-2025-54255 warning
- CVE-2025-54257 critical
Read more
Find out the statistics of the vulnerabilities spreading in your region on statistics.securelist.com
Found an inaccuracy in the description of this vulnerability? Let us know!