Photoshop Installer Vulnerability Allows Arbitrary Code Execution
The National Vulnerability Database (NVD) recently detailed CVE-2026-34632, a high-severity vulnerability affecting the Adobe Photoshop Installer. This flaw, categorized as an Uncontrolled Search Path Element (CWE-427), could enable a low-privileged local attacker to achieve arbitrary code execution in the context of the current user. Essentially, an attacker could manipulate the search path the installer uses to find critical resources, tricking it into executing malicious code instead.
While the CVSS score of 8.2 (HIGH) is concerning, it’s important to note that exploitation isn’t entirely silent. According to the NVD, user interaction is required; specifically, a user must be actively running the Photoshop installer for the vulnerability to be triggered. This mitigates some of the immediate ‘lights out’ threat, but it’s still a significant risk, especially in environments where users frequently install or update software.
Related ATT&CK Techniques
🛡️ Detection Rules
3 rules · 6 SIEM formats3 auto-generated detection rules for this incident, mapped to MITRE ATT&CK. Available in Sigma, Splunk SPL, Sentinel KQL, Elastic Lucene, QRadar AQL, and Wazuh.
Suspicious File Download via Email
Want this in your SIEM's native format? Get Splunk SPL, Sentinel KQL, Elastic, QRadar AQL, or Wazuh — ready to paste.
3 Sigma rules mapped to the ATT&CK techniques from this breach — pick your SIEM and get a ready-to-paste query.
Get All SIEM Formats →Indicators of Compromise
| ID | Type | Indicator |
|---|---|---|
| CVE-2026-34632 | RCE | Adobe Photoshop Installer |
| CVE-2026-34632 | RCE | Uncontrolled Search Path Element vulnerability |