Introduction
A path traversal flaw in Adobe ColdFusion, disclosed on April 14, 2026, gives authenticated attackers the ability to sidestep security restrictions and reach files or directories that should be off limits, all without any user interaction. What makes this particularly worth tracking is not just the CVSS 7.7 score or the Priority 1 patch rating, but the broader context: ColdFusion has a well documented history of being weaponized quickly after disclosure, including incidents where threat actors breached U.S. government servers within a narrow window after a 2023 vulnerability became public.
Technical Information
Root Cause and CWE Classification
CVE-2026-34619 is classified under CWE-22: Improper Limitation of a Pathname to a Restricted Directory. At its core, the vulnerability exists because ColdFusion fails to properly sanitize or restrict user controlled path components in certain requests. This allows an authenticated attacker to construct requests containing directory traversal sequences (such as ../ or URL encoded variants) that break out of the intended directory scope, bypassing security features designed to confine file access.
CVSS Vector Breakdown
The NVD and Adobe assign this vulnerability a CVSS 3.1 base score of 7.7 with the following vector:
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
Breaking this down:
| Metric | Value | Meaning |
|---|---|---|
| Attack Vector (AV) | Network | Remotely exploitable |
| Attack Complexity (AC) | Low | No special conditions required |
| Privileges Required (PR) | Low | Authenticated access needed |
| User Interaction (UI) | None | No victim action required |
| Scope (S) | Changed | Impact extends beyond the vulnerable component |
| Confidentiality (C) | None | No data disclosure |
| Integrity (I) | None | No data modification |
| Availability (A) | High | Significant disruption possible |
The "Changed" scope combined with "High" availability impact is notable. It suggests that exploitation can affect resources beyond the ColdFusion application itself, potentially disrupting dependent services or the underlying server infrastructure.
Conflicting Vendor Classifications
There is a meaningful discrepancy in how different security vendors characterize this vulnerability. Adobe and the NVD define CVE-2026-34619 as a path traversal issue leading to a security feature bypass. FortiGuard Labs, however, categorizes it as an Improper Input Validation vulnerability. According to FortiGuard, the flaw stems from insufficient validation of user supplied input, and successful exploitation via a crafted request could allow a remote attacker to gain unauthorized access to modify variables and execute code.
This divergence matters for defenders. If FortiGuard's assessment is accurate, the impact could extend beyond availability disruption to include code execution. Security teams should assume the worst case scenario until patches are fully deployed and more granular technical details emerge.
Attack Flow
Based on the available information, the exploitation path follows this general sequence:
- The attacker authenticates to the ColdFusion server with low level credentials (the PR:L requirement in the CVSS vector).
- The attacker crafts an HTTP request containing manipulated path components designed to traverse outside the intended directory restrictions. These could include classic
../sequences, URL encoded variants (%2e%2e%2f), or other path normalization tricks. - The ColdFusion application fails to properly validate or sanitize the path input, allowing the traversal to succeed.
- The attacker reaches files or directories outside the application's intended scope, bypassing security features that should enforce path restrictions.
- Depending on the exact nature of the bypass (which Adobe has not publicly detailed), this could result in denial of service conditions affecting the ColdFusion instance and potentially dependent services.
Broader Bulletin Context
CVE-2026-34619 was released as part of Adobe Security Bulletin APSB26-38, which addresses seven vulnerabilities across ColdFusion 2025 and 2023. The full list provides important context on the overall risk to unpatched environments:
| CVE | Category | Impact | CVSS |
|---|---|---|---|
| CVE-2026-27304 | Improper Input Validation (CWE-20) | Arbitrary code execution | 9.3 |
| CVE-2026-27305 | Path Traversal (CWE-22) | Arbitrary file system read | 8.6 |
| CVE-2026-27306 | Improper Input Validation (CWE-20) | Arbitrary code execution | 8.4 |
| CVE-2026-34619 | Path Traversal (CWE-22) | Security feature bypass | 7.7 |
| CVE-2026-27282 | Improper Input Validation (CWE-20) | Security feature bypass | 7.5 |
| CVE-2026-27307 | Uncontrolled Resource Consumption (CWE-400) | Application DoS | 2.4 |
| CVE-2026-27308 | Uncontrolled Resource Consumption (CWE-400) | Application DoS | 2.4 |
The presence of two critical arbitrary code execution flaws (CVSS 9.3 and 8.4) alongside CVE-2026-34619 amplifies the urgency. Administrators applying the cumulative updates will remediate all seven issues simultaneously.
Patch Information
Adobe addressed CVE-2026-34619 on April 14, 2026, through security bulletin APSB26-38, assigning it the highest urgency Priority 1 rating. Patches were available immediately upon public disclosure, consistent with Adobe's coordinated disclosure process. The researcher Jonathan Lein of TrendAI Research reported the flaw and worked with Adobe prior to publication.
Fixed Versions
| Product | Vulnerable Versions | Fixed Version | Build Number |
|---|---|---|---|
| ColdFusion 2025 | Update 6 and earlier | Update 7 | 2025,0,07,331586 |
| ColdFusion 2023 | Update 18 and earlier | Update 19 | 2023,0,19,330899 |
What the Updates Include
Beyond the specific path traversal fix, these updates deliver broader hardening:
- ColdFusion 2025 Update 7 upgrades the embedded Apache Tomcat engine to version 10.1.53.0
- ColdFusion 2023 Update 19 upgrades its Tomcat to version 9.0.116.0
Each update also ships refreshed versions of the adminapi, administrator, and CCS packages, indicating the fix likely touches server administration and configuration subsystem components, the areas most commonly involved in enforcing file path restrictions.
Installation Methods
The updates are cumulative, meaning administrators who are several updates behind can jump directly to the latest update without applying each intermediate hotfix individually. Installation can be performed through:
- ColdFusion Administrator UI: Package Manager, then Check for Updates
- Manual offline installation by downloading the respective hotfix JARs:
- ColdFusion 2025:
hotfix-007-331586.jar - ColdFusion 2023:
hotfix-019-330899.jar
- ColdFusion 2025:
Additional Hardening
For JEE deployments, Adobe recommends configuring the jdk.serialFilter JVM flag to block known dangerous deserialization classes, and following the updated ColdFusion Lockdown Guides for each version. No connector recreation is required when upgrading to either of these updates.
Administrators should account for the Tomcat version changes during change management processes and conduct compatibility testing in staging environments. On 64 bit systems, ensure a 64 bit Java Runtime Environment is in use for 64 bit ColdFusion installations.
Detection Methods
Network Based IPS Detection
FortiGuard Labs has released a dedicated Intrusion Prevention System (IPS) signature targeting this vulnerability. The signature details:
- Name:
Adobe.ColdFusion.CVE-2026-34619.Improper.Input.Validation - Signature ID: 60675
- IPS Definition Version: 36.201
- Created: April 14, 2026
- Platforms: Windows, Linux, MacOS
The signature is designed to detect crafted network requests containing the path traversal patterns that characterize this attack, intercepting malicious requests at the network layer before they reach the ColdFusion application. Organizations running Fortinet devices should ensure their IPS definitions are updated to version 36.201 or later.
Version Based Detection
The most straightforward detection approach is asset inventory and version checking. According to both the NVD entry and APSB26-38:
- ColdFusion 2025: Update 6 and earlier are vulnerable
- ColdFusion 2023: Update 18 and earlier are vulnerable
SCAP compliant vulnerability scanning tools (as recommended by the CIS advisory 2026-034) should flag unpatched instances. Security teams can also verify ColdFusion versions directly through the server's administrator panel or installation metadata.
Web Application Firewall Monitoring
Given the CWE-22 classification, existing WAF rules that detect path traversal attempts can provide a layer of detection. Most modern WAFs carry generic path traversal rulesets that would raise alerts on directory traversal sequences in URI paths, query parameters, or POST bodies targeting ColdFusion endpoints.
Log Based Detection
Security teams should review ColdFusion access logs and web server logs (Apache, IIS, or the embedded Tomcat instance) for:
- Requests containing path traversal indicators aimed at ColdFusion endpoints
- Unusual access patterns to files or directories outside the expected ColdFusion web root
- HTTP requests returning unexpected status codes, such as 200 responses for paths that should not be directly accessible
Host Based Detection
The CIS advisory (MS-ISAC 2026-034) specifically recommends deploying host based intrusion detection and prevention solutions on enterprise assets running affected Adobe products (referencing CIS Safeguards 13.2 and 13.7). EDR agents or host based IPS can monitor for anomalous file access patterns on the ColdFusion server, especially access to sensitive files or directories outside the application's intended scope.
No public YARA, Sigma, Snort, or Suricata rules specifically targeting CVE-2026-34619 have been identified at the time of writing.
Affected Systems and Versions
The following ColdFusion versions are confirmed vulnerable:
- ColdFusion 2025: Update 6 and all earlier updates
- ColdFusion 2023: Update 18 and all earlier updates
Both product tracks are affected regardless of the underlying operating system (Windows, Linux, MacOS). The vulnerability is network reachable and requires only low level authenticated access, meaning any ColdFusion instance exposed to a network where an attacker holds valid credentials is at risk. Internet facing ColdFusion servers represent the highest priority for remediation.
Vendor Security History
ColdFusion has a documented history of being targeted by advanced threat actors, making the patching timeline for new vulnerabilities particularly important. In late 2023, CISA issued urgent warnings regarding CVE-2023-26360, an unauthenticated remote code execution vulnerability in Adobe ColdFusion. Threat actors actively exploited that flaw to gain initial access and breach United States government servers. The FBI and CISA released joint advisories detailing these attacks, highlighting the speed at which adversaries weaponize ColdFusion vulnerabilities after disclosure.
This historical pattern is directly relevant to CVE-2026-34619. While no exploitation in the wild has been reported as of April 14, 2026, the precedent established by CVE-2023-26360 demonstrates that the window between ColdFusion vulnerability disclosure and active exploitation can be extremely narrow. Organizations should treat the Priority 1 rating as a signal to patch within days, not weeks.
References
- Adobe Security Bulletin APSB26-38
- NVD: CVE-2026-34619
- CIS Advisory: Multiple Vulnerabilities in Adobe Products
- FortiGuard IPS Encyclopedia: Signature 60675
- ColdFusion 2025 Update 7 Tech Notes
- ColdFusion 2023 Update 19 Tech Notes
- Zero Day Initiative: April 2026 Security Update Review
- Malwarebytes: Adobe ColdFusion Vulnerability Used in Attacks on Government Servers
- The Hacker News: Hackers Exploited ColdFusion Vulnerability to Breach Government Systems
- SecureLayer7: Unauthenticated RCE in Adobe ColdFusion



