{"api_version":"1","generated_at":"2026-05-13T05:56:14+00:00","cve":"CVE-2021-36047","urls":{"html":"https://cve.report/CVE-2021-36047","api":"https://cve.report/api/cve/CVE-2021-36047.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2021-36047","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2021-36047"},"summary":{"title":"CVE-2021-36047","description":"XMP Toolkit SDK version 2020.1 (and earlier) is affected by an Improper Input Validation vulnerability potentially resulting in arbitrary code execution in the context of the current user. Exploitation requires user interaction in that a victim must open a crafted file.","state":"PUBLIC","assigner":"psirt@adobe.com","published_at":"2021-09-01 15:15:00","updated_at":"2023-10-19 20:47:00"},"problem_types":["CWE-20"],"metrics":[],"references":[{"url":"https://helpx.adobe.com/security/products/xmpcore/apsb21-65.html","name":"https://helpx.adobe.com/security/products/xmpcore/apsb21-65.html","refsource":"MISC","tags":[],"title":"Adobe Security Bulletin","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://lists.debian.org/debian-lts-announce/2023/09/msg00032.html","name":"[debian-lts-announce] 20230925 [SECURITY] [DLA 3585-1] exempi security update","refsource":"MLIST","tags":[],"title":"[SECURITY] [DLA 3585-1] exempi security update","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2021-36047","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-36047","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2021","cve_id":"36047","vulnerable":"1","versionEndIncluding":"2020.1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"adobe","cpe5":"xmp_toolkit_sdk","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"36047","vulnerable":"1","versionEndIncluding":"2020.1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"adobe","cpe5":"xmp_toolkit_software_development_kit","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"36047","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"debian","cpe5":"debian_linux","cpe6":"10.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2021-36047","qid":"183931","title":"Debian Security Update for exempi (CVE-2021-36047)"},{"cve":"CVE-2021-36047","qid":"198834","title":"Ubuntu Security Notification for Exempi Vulnerabilities (USN-5483-1)"},{"cve":"CVE-2021-36047","qid":"6000108","title":"Debian Security Update for exempi (DLA 3585-1)"}]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"psirt@adobe.com","DATE_PUBLIC":"2021-08-16T23:00:00.000Z","ID":"CVE-2021-36047","STATE":"PUBLIC","TITLE":"XMP Toolkit SDK Improper Input Validation Could Lead To Arbitrary Code Execution"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"XMP Toolkit","version":{"version_data":[{"version_affected":"<=","version_value":"2020.1"},{"version_affected":"<=","version_value":"None"},{"version_affected":"<=","version_value":"None"},{"version_affected":"<=","version_value":"None"}]}}]},"vendor_name":"Adobe"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"XMP Toolkit SDK version 2020.1 (and earlier) is affected by an Improper Input Validation vulnerability potentially resulting in arbitrary code execution in the context of the current user. Exploitation requires user interaction in that a victim must open a crafted file."}]},"impact":{"cvss":{"attackComplexity":"Low","attackVector":"Local","availabilityImpact":"High","baseScore":7.8,"baseSeverity":"High","confidentialityImpact":"High","integrityImpact":"High","privilegesRequired":"None","scope":"Unchanged","userInteraction":"Required","vectorString":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","version":"3.1"}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"Improper Input Validation (CWE-20)"}]}]},"references":{"reference_data":[{"refsource":"MISC","url":"https://helpx.adobe.com/security/products/xmpcore/apsb21-65.html","name":"https://helpx.adobe.com/security/products/xmpcore/apsb21-65.html"},{"refsource":"MLIST","name":"[debian-lts-announce] 20230925 [SECURITY] [DLA 3585-1] exempi security update","url":"https://lists.debian.org/debian-lts-announce/2023/09/msg00032.html"}]},"source":{"discovery":"EXTERNAL"}},"nvd":{"publishedDate":"2021-09-01 15:15:00","lastModifiedDate":"2023-10-19 20:47:00","problem_types":["CWE-20"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":7.8,"baseSeverity":"HIGH"},"exploitabilityScore":1.8,"impactScore":5.9},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:C/I:C/A:C","accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE","baseScore":9.3},"severity":"HIGH","exploitabilityScore":8.6,"impactScore":10,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:adobe:xmp_toolkit_software_development_kit:*:*:*:*:*:*:*:*","versionEndIncluding":"2020.1","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2021","CveId":"36047","Ordinal":"211557","Title":"CVE-2021-36047","CVE":"CVE-2021-36047","Year":"2021"},"notes":[{"CveYear":"2021","CveId":"36047","Ordinal":"1","NoteData":"XMP Toolkit SDK version 2020.1 (and earlier) is affected by an Improper Input Validation vulnerability potentially resulting in arbitrary code execution in the context of the current user. Exploitation requires user interaction in that a victim must open a crafted file.","Type":"Description","Title":null},{"CveYear":"2021","CveId":"36047","Ordinal":"2","NoteData":"2021-09-01","Type":"Other","Title":"Published"},{"CveYear":"2021","CveId":"36047","Ordinal":"3","NoteData":"2021-09-01","Type":"Other","Title":"Modified"}]}}}