Critical XSS Hits Adobe Connect: Patch Now!
A critical DOM-based Cross-Site Scripting (XSS) vulnerability, tracked as CVE-2026-27246, has been identified in Adobe Connect versions 2025.3, 12.10, and earlier. According to the National Vulnerability Database, this flaw could allow an attacker to inject and execute malicious JavaScript within a victim’s browser context by manipulating the Document Object Model (DOM) environment.
Exploitation requires user interaction: a victim must visit a specially crafted webpage. While this might sound like a simple phishing vector, the potential impact is severe, earning a CVSS score of 9.3 (CRITICAL). A successful attack could lead to session hijacking, data theft, or further compromise within the victim’s browser session. The Common Weakness Enumeration (CWE) associated with this vulnerability is CWE-79, a classic XSS category.
Related ATT&CK Techniques
🛡️ Detection Rules
6 rules · 5 SIEM formats6 auto-generated detection rules for this incident, mapped to MITRE ATT&CK. Available in Sigma, Splunk SPL, Sentinel KQL, Elastic Lucene, and QRadar AQL.
Drive-by Download via Browser — Critical XSS Hits Adobe Connect: Patch N
Get this rule in your SIEM's native format — copy, paste, detect. No manual conversion.
6 Sigma rules mapped to the ATT&CK techniques from this breach — pick your SIEM and get a ready-to-paste query.
Get Detection Rules →Indicators of Compromise
| ID | Type | Indicator |
|---|---|---|
| CVE-2026-27246 | XSS | Adobe Connect versions 2025.3 and earlier |
| CVE-2026-27246 | XSS | Adobe Connect versions 12.10 and earlier |
| CVE-2026-27246 | XSS | DOM-based Cross-Site Scripting |