CVE-2025-21127

7.8 HIGH

📋 TL;DR

This CVE describes an uncontrolled search path element vulnerability in Adobe Photoshop Desktop that could allow arbitrary code execution. Attackers could manipulate environment variables to load malicious libraries when Photoshop launches. Affected users include anyone running vulnerable Photoshop versions 25.12, 26.1 and earlier.

💻 Affected Systems

Products:
  • Adobe Photoshop Desktop
Versions: 25.12, 26.1 and earlier
Operating Systems: Windows, macOS
Default Config Vulnerable: ⚠️ Yes
Notes: All default installations of affected versions are vulnerable. Requires user to launch Photoshop after environment variable manipulation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with attacker gaining the same privileges as the Photoshop user, potentially leading to data theft, ransomware deployment, or persistent backdoor installation.

🟠

Likely Case

Local privilege escalation or malware execution in the context of the Photoshop user account, allowing attackers to access sensitive files or install additional payloads.

🟢

If Mitigated

Limited impact with proper application whitelisting and user privilege restrictions, potentially only affecting user-specific files and settings.

🌐 Internet-Facing: LOW - This vulnerability requires local access or social engineering to manipulate environment variables before Photoshop launch.
🏢 Internal Only: MEDIUM - Internal attackers with access to user workstations could exploit this, but it requires user interaction to launch Photoshop.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires social engineering or local access to modify environment variables, plus user interaction to launch Photoshop.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Update to Photoshop 25.13 or 26.2 or later

Vendor Advisory: https://helpx.adobe.com/security/products/photoshop/apsb25-02.html

Restart Required: No

Instructions:

1. Open Adobe Creative Cloud application. 2. Navigate to Apps tab. 3. Find Photoshop and click Update. 4. Alternatively, download latest version from Adobe website.

🔧 Temporary Workarounds

Restrict PATH environment variable modifications

all

Prevent users or processes from modifying PATH environment variables that Photoshop uses

Windows: Use Group Policy to restrict environment variable modifications
macOS: Use configuration profiles to lock environment variables

Application control/whitelisting

all

Implement application control to prevent unauthorized DLL/library loading

Windows: Configure AppLocker or Windows Defender Application Control
macOS: Use Gatekeeper and System Integrity Protection

🧯 If You Can't Patch

  • Implement least privilege - Run Photoshop with standard user accounts, not administrator privileges
  • Monitor for suspicious environment variable modifications and unauthorized library loading attempts

🔍 How to Verify

Check if Vulnerable:

Check Photoshop version via Help > About Photoshop or Creative Cloud app

Check Version:

Windows: Get-ItemProperty 'HKLM:\SOFTWARE\Adobe\Photoshop\*' | Select-Object Version | macOS: /Applications/Adobe\ Photoshop\ */Adobe\ Photoshop.app/Contents/Info.plist | grep -A1 CFBundleShortVersionString

Verify Fix Applied:

Verify Photoshop version is 25.13 or higher for v25, or 26.2 or higher for v26

📡 Detection & Monitoring

Log Indicators:

  • Unusual DLL/library loading from non-standard paths
  • Process creation events for Photoshop with modified environment variables
  • Failed library loading attempts from unexpected locations

Network Indicators:

  • Outbound connections from Photoshop process to suspicious domains post-launch

SIEM Query:

process_name:"photoshop.exe" AND (event_type:"process_creation" AND env_vars_modified:true) OR (event_type:"dll_load" AND file_path NOT CONTAINS "Program Files\\Adobe\\Photoshop")

🔗 References

📤 Share & Export