Adobe ColdFusion CVE-2026-34619: Quick Look at a Priority 1 Path Traversal Bypass

A brief summary of CVE-2026-34619, a path traversal vulnerability in Adobe ColdFusion that enables authenticated attackers to bypass security restrictions and access unauthorized files. Includes patch details, detection methods, and context on ColdFusion's history as a target for advanced threat actors.

CVE Analysis

8 min read

ZeroPath CVE Analysis
ZeroPath CVE Analysis

2026-04-14

Adobe ColdFusion CVE-2026-34619: Quick Look at a Priority 1 Path Traversal Bypass
Experimental AI-Generated Content

This CVE analysis is an experimental publication that is completely AI-generated. The content may contain errors or inaccuracies and is subject to change as more information becomes available. We are continuously refining our process.

If you have feedback, questions, or notice any errors, please reach out to us.

[email protected]

Introduction

A path traversal flaw in Adobe ColdFusion, disclosed on April 14, 2026, gives authenticated attackers the ability to sidestep security restrictions and reach files or directories that should be off limits, all without any user interaction. What makes this particularly worth tracking is not just the CVSS 7.7 score or the Priority 1 patch rating, but the broader context: ColdFusion has a well documented history of being weaponized quickly after disclosure, including incidents where threat actors breached U.S. government servers within a narrow window after a 2023 vulnerability became public.

Technical Information

Root Cause and CWE Classification

CVE-2026-34619 is classified under CWE-22: Improper Limitation of a Pathname to a Restricted Directory. At its core, the vulnerability exists because ColdFusion fails to properly sanitize or restrict user controlled path components in certain requests. This allows an authenticated attacker to construct requests containing directory traversal sequences (such as ../ or URL encoded variants) that break out of the intended directory scope, bypassing security features designed to confine file access.

CVSS Vector Breakdown

The NVD and Adobe assign this vulnerability a CVSS 3.1 base score of 7.7 with the following vector:

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H

Breaking this down:

MetricValueMeaning
Attack Vector (AV)NetworkRemotely exploitable
Attack Complexity (AC)LowNo special conditions required
Privileges Required (PR)LowAuthenticated access needed
User Interaction (UI)NoneNo victim action required
Scope (S)ChangedImpact extends beyond the vulnerable component
Confidentiality (C)NoneNo data disclosure
Integrity (I)NoneNo data modification
Availability (A)HighSignificant disruption possible

The "Changed" scope combined with "High" availability impact is notable. It suggests that exploitation can affect resources beyond the ColdFusion application itself, potentially disrupting dependent services or the underlying server infrastructure.

Conflicting Vendor Classifications

There is a meaningful discrepancy in how different security vendors characterize this vulnerability. Adobe and the NVD define CVE-2026-34619 as a path traversal issue leading to a security feature bypass. FortiGuard Labs, however, categorizes it as an Improper Input Validation vulnerability. According to FortiGuard, the flaw stems from insufficient validation of user supplied input, and successful exploitation via a crafted request could allow a remote attacker to gain unauthorized access to modify variables and execute code.

This divergence matters for defenders. If FortiGuard's assessment is accurate, the impact could extend beyond availability disruption to include code execution. Security teams should assume the worst case scenario until patches are fully deployed and more granular technical details emerge.

Attack Flow

Based on the available information, the exploitation path follows this general sequence:

  1. The attacker authenticates to the ColdFusion server with low level credentials (the PR:L requirement in the CVSS vector).
  2. The attacker crafts an HTTP request containing manipulated path components designed to traverse outside the intended directory restrictions. These could include classic ../ sequences, URL encoded variants (%2e%2e%2f), or other path normalization tricks.
  3. The ColdFusion application fails to properly validate or sanitize the path input, allowing the traversal to succeed.
  4. The attacker reaches files or directories outside the application's intended scope, bypassing security features that should enforce path restrictions.
  5. Depending on the exact nature of the bypass (which Adobe has not publicly detailed), this could result in denial of service conditions affecting the ColdFusion instance and potentially dependent services.

Broader Bulletin Context

CVE-2026-34619 was released as part of Adobe Security Bulletin APSB26-38, which addresses seven vulnerabilities across ColdFusion 2025 and 2023. The full list provides important context on the overall risk to unpatched environments:

CVECategoryImpactCVSS
CVE-2026-27304Improper Input Validation (CWE-20)Arbitrary code execution9.3
CVE-2026-27305Path Traversal (CWE-22)Arbitrary file system read8.6
CVE-2026-27306Improper Input Validation (CWE-20)Arbitrary code execution8.4
CVE-2026-34619Path Traversal (CWE-22)Security feature bypass7.7
CVE-2026-27282Improper Input Validation (CWE-20)Security feature bypass7.5
CVE-2026-27307Uncontrolled Resource Consumption (CWE-400)Application DoS2.4
CVE-2026-27308Uncontrolled Resource Consumption (CWE-400)Application DoS2.4

The presence of two critical arbitrary code execution flaws (CVSS 9.3 and 8.4) alongside CVE-2026-34619 amplifies the urgency. Administrators applying the cumulative updates will remediate all seven issues simultaneously.

Patch Information

Adobe addressed CVE-2026-34619 on April 14, 2026, through security bulletin APSB26-38, assigning it the highest urgency Priority 1 rating. Patches were available immediately upon public disclosure, consistent with Adobe's coordinated disclosure process. The researcher Jonathan Lein of TrendAI Research reported the flaw and worked with Adobe prior to publication.

Fixed Versions

ProductVulnerable VersionsFixed VersionBuild Number
ColdFusion 2025Update 6 and earlierUpdate 72025,0,07,331586
ColdFusion 2023Update 18 and earlierUpdate 192023,0,19,330899

What the Updates Include

Beyond the specific path traversal fix, these updates deliver broader hardening:

  • ColdFusion 2025 Update 7 upgrades the embedded Apache Tomcat engine to version 10.1.53.0
  • ColdFusion 2023 Update 19 upgrades its Tomcat to version 9.0.116.0

Each update also ships refreshed versions of the adminapi, administrator, and CCS packages, indicating the fix likely touches server administration and configuration subsystem components, the areas most commonly involved in enforcing file path restrictions.

Installation Methods

The updates are cumulative, meaning administrators who are several updates behind can jump directly to the latest update without applying each intermediate hotfix individually. Installation can be performed through:

  1. ColdFusion Administrator UI: Package Manager, then Check for Updates
  2. Manual offline installation by downloading the respective hotfix JARs:
    • ColdFusion 2025: hotfix-007-331586.jar
    • ColdFusion 2023: hotfix-019-330899.jar

Additional Hardening

For JEE deployments, Adobe recommends configuring the jdk.serialFilter JVM flag to block known dangerous deserialization classes, and following the updated ColdFusion Lockdown Guides for each version. No connector recreation is required when upgrading to either of these updates.

Administrators should account for the Tomcat version changes during change management processes and conduct compatibility testing in staging environments. On 64 bit systems, ensure a 64 bit Java Runtime Environment is in use for 64 bit ColdFusion installations.

Detection Methods

Network Based IPS Detection

FortiGuard Labs has released a dedicated Intrusion Prevention System (IPS) signature targeting this vulnerability. The signature details:

  • Name: Adobe.ColdFusion.CVE-2026-34619.Improper.Input.Validation
  • Signature ID: 60675
  • IPS Definition Version: 36.201
  • Created: April 14, 2026
  • Platforms: Windows, Linux, MacOS

The signature is designed to detect crafted network requests containing the path traversal patterns that characterize this attack, intercepting malicious requests at the network layer before they reach the ColdFusion application. Organizations running Fortinet devices should ensure their IPS definitions are updated to version 36.201 or later.

Version Based Detection

The most straightforward detection approach is asset inventory and version checking. According to both the NVD entry and APSB26-38:

  • ColdFusion 2025: Update 6 and earlier are vulnerable
  • ColdFusion 2023: Update 18 and earlier are vulnerable

SCAP compliant vulnerability scanning tools (as recommended by the CIS advisory 2026-034) should flag unpatched instances. Security teams can also verify ColdFusion versions directly through the server's administrator panel or installation metadata.

Web Application Firewall Monitoring

Given the CWE-22 classification, existing WAF rules that detect path traversal attempts can provide a layer of detection. Most modern WAFs carry generic path traversal rulesets that would raise alerts on directory traversal sequences in URI paths, query parameters, or POST bodies targeting ColdFusion endpoints.

Log Based Detection

Security teams should review ColdFusion access logs and web server logs (Apache, IIS, or the embedded Tomcat instance) for:

  • Requests containing path traversal indicators aimed at ColdFusion endpoints
  • Unusual access patterns to files or directories outside the expected ColdFusion web root
  • HTTP requests returning unexpected status codes, such as 200 responses for paths that should not be directly accessible

Host Based Detection

The CIS advisory (MS-ISAC 2026-034) specifically recommends deploying host based intrusion detection and prevention solutions on enterprise assets running affected Adobe products (referencing CIS Safeguards 13.2 and 13.7). EDR agents or host based IPS can monitor for anomalous file access patterns on the ColdFusion server, especially access to sensitive files or directories outside the application's intended scope.

No public YARA, Sigma, Snort, or Suricata rules specifically targeting CVE-2026-34619 have been identified at the time of writing.

Affected Systems and Versions

The following ColdFusion versions are confirmed vulnerable:

  • ColdFusion 2025: Update 6 and all earlier updates
  • ColdFusion 2023: Update 18 and all earlier updates

Both product tracks are affected regardless of the underlying operating system (Windows, Linux, MacOS). The vulnerability is network reachable and requires only low level authenticated access, meaning any ColdFusion instance exposed to a network where an attacker holds valid credentials is at risk. Internet facing ColdFusion servers represent the highest priority for remediation.

Vendor Security History

ColdFusion has a documented history of being targeted by advanced threat actors, making the patching timeline for new vulnerabilities particularly important. In late 2023, CISA issued urgent warnings regarding CVE-2023-26360, an unauthenticated remote code execution vulnerability in Adobe ColdFusion. Threat actors actively exploited that flaw to gain initial access and breach United States government servers. The FBI and CISA released joint advisories detailing these attacks, highlighting the speed at which adversaries weaponize ColdFusion vulnerabilities after disclosure.

This historical pattern is directly relevant to CVE-2026-34619. While no exploitation in the wild has been reported as of April 14, 2026, the precedent established by CVE-2023-26360 demonstrates that the window between ColdFusion vulnerability disclosure and active exploitation can be extremely narrow. Organizations should treat the Priority 1 rating as a signal to patch within days, not weeks.

References

Detect & fix
what others miss

Security magnifying glass visualization