Substance 3d Stager Adobe Substance 3d Stager

Don't miss out!

Thousands of developers use stack.watch to stay informed.
Get an email whenever new security vulnerabilities are reported in Adobe Substance 3d Stager.

By the Year

In 2026 there have been 12 vulnerabilities in Adobe Substance 3d Stager with an average score of 7.8 out of ten. Last year, in 2025 Substance 3d Stager had 25 security vulnerabilities published. If vulnerabilities keep coming in at the current rate, it appears that number of security vulnerabilities in Substance 3d Stager in 2026 could surpass last years number. However, the average CVE base score of the vulnerabilities in 2026 is greater by 0.37.




Year Vulnerabilities Average Score
2026 12 7.80
2025 25 7.43
2024 17 6.85
2023 29 7.09

It may take a day or so for new Substance 3d Stager vulnerabilities to show up in the stats or in the list of recent security vulnerabilities. Additionally vulnerabilities may be tagged under a different product or component name.

Recent Adobe Substance 3d Stager Security Vulnerabilities

Adobe Substance3D Stager <=3.1.7 OOB Write Arbit Code Exec (user interaction)
CVE-2026-27274 7.8 - High - March 10, 2026

Substance3D - Stager versions 3.1.7 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

Memory Corruption

Substance3D Stager UAF (3.1.7) Arbitrary Code Exec
CVE-2026-27277 7.8 - High - March 10, 2026

Substance3D - Stager versions 3.1.7 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

Dangling pointer

Substance3D Stager <=3.1.7 OOB Write -> Arbitrary Code Exec
CVE-2026-27273 7.8 - High - March 10, 2026

Substance3D - Stager versions 3.1.7 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

Memory Corruption

Substance3D Stager 3.1.7: OOB Write Arbitrary Exec (Adobe)
CVE-2026-27275 7.8 - High - March 10, 2026

Substance3D - Stager versions 3.1.7 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

Memory Corruption

Substance3D Stager OOB write 3.1.7 & earlier arbitrary code exec
CVE-2026-27279 7.8 - High - March 10, 2026

Substance3D - Stager versions 3.1.7 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

Memory Corruption

Substance3D Stager UAF in 3.1.7 and earlier (Adobe)
CVE-2026-27276 7.8 - High - March 10, 2026

Substance3D - Stager versions 3.1.7 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

Dangling pointer

Substance3D Stager 3.1.6 OOB Read in File Parser
CVE-2026-21344 7.8 - High - February 10, 2026

Substance3D - Stager versions 3.1.6 and earlier are affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to execute code in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

Out-of-bounds Read

Substance3D Stager 3.1.6 OOB Read CVE-2026-21343
CVE-2026-21343 7.8 - High - February 10, 2026

Substance3D - Stager versions 3.1.6 and earlier are affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to execute code in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

Out-of-bounds Read

Substance3D Stager 3.1.6 & older OOB Write Arbitrary Code Exec
CVE-2026-21341 7.8 - High - February 10, 2026

Substance3D - Stager versions 3.1.6 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

Memory Corruption

Substance3D Stager 3.1.6 OOB Read Vulnerability
CVE-2026-21345 7.8 - High - February 10, 2026

Substance3D - Stager versions 3.1.6 and earlier are affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to execute code in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

Out-of-bounds Read

Out-of-Bounds Write in Substance3D Stager <3.1.6: Arbitrary Code Exec
CVE-2026-21342 7.8 - High - February 10, 2026

Substance3D - Stager versions 3.1.6 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

Memory Corruption

Use After Free in Adobe Substance3D Stager <=3.1.5 -> RCE
CVE-2026-21287 7.8 - High - January 13, 2026

Substance3D - Stager versions 3.1.5 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

Dangling pointer

Substance3D Stager <=3.1.5: Integer Underflow Arbitrary Code Exec
CVE-2025-61835 7.8 - High - November 11, 2025

Substance3D - Stager versions 3.1.5 and earlier are affected by an Integer Underflow (Wrap or Wraparound) vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

Integer underflow

Substance3D Stager OOB Read (<=3.1.5) Enables User-Context Code Exec
CVE-2025-61833 7.8 - High - November 11, 2025

Substance3D - Stager versions 3.1.5 and earlier are affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to execute code in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

Out-of-bounds Read

Substance3D Stager <=3.1.5 UAF leads to arbitrary code exec
CVE-2025-64531 7.8 - High - November 11, 2025

Substance3D - Stager versions 3.1.5 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

Dangling pointer

Substance3D Stager <3.1.6 UseAfterFree: Arbitrary Code Execution
CVE-2025-61834 7.8 - High - November 11, 2025

Substance3D - Stager versions 3.1.5 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

Dangling pointer

Substance3D Stager <=3.1.4 Integer Overflow RCE via Malicious File
CVE-2025-61803 7.8 - High - October 14, 2025

Substance3D - Stager versions 3.1.4 and earlier are affected by an Integer Overflow or Wraparound vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

Integer Overflow or Wraparound

Substance3D Stager Use-After-Free v3.1.4- prior to v3.1.4: Arbitrary Code Execution
CVE-2025-61802 7.8 - High - October 14, 2025

Substance3D - Stager versions 3.1.4 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

Dangling pointer

Substance3D Stager <3.1.4: Integer Overflow Arbitrary Code via Malicious File
CVE-2025-61807 7.8 - High - October 14, 2025

Substance3D - Stager versions 3.1.4 and earlier are affected by an Integer Overflow or Wraparound vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

Integer Overflow or Wraparound

Substance3D Stager 3.1.4 OOB Read Allowing Code Execution
CVE-2025-61805 7.8 - High - October 14, 2025

Substance3D - Stager versions 3.1.4 and earlier are affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to execute code in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

Out-of-bounds Read

Substance3D Stager <3.1.4: OOB Read in File Parsing
CVE-2025-61806 7.8 - High - October 14, 2025

Substance3D - Stager versions 3.1.4 and earlier are affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to execute code in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

Out-of-bounds Read

Substance 3D Stager 3.1.3-: OOB read leads to memory exposure
CVE-2025-54237 5.5 - Medium - September 16, 2025

Substance3D - Stager versions 3.1.3 and earlier are affected by an out-of-bounds read vulnerability that could lead to memory exposure. An attacker could leverage this vulnerability to disclose sensitive information. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

Out-of-bounds Read

OOB Read in Substance3D Stager <=3.1.3 Enables Code Exec (User Interaction)
CVE-2025-54262 7.8 - High - September 16, 2025

Substance3D - Stager versions 3.1.3 and earlier are affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to execute code in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

Out-of-bounds Read

CVE-2025-54222: Substance3D Stager <3.1.3 OOB Write
CVE-2025-54222 7.8 - High - August 12, 2025

Substance3D - Stager versions 3.1.3 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

Memory Corruption

Substance3D Stager OOB Read before 3.1.2; data exfil via crafted file
CVE-2025-27165 5.5 - Medium - July 08, 2025

Substance3D - Stager versions 3.1.2 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

Out-of-bounds Read

Adobe Substance3D Stager <=3.1.1 Use-After-Free: RCE
CVE-2025-43571 7.8 - High - May 13, 2025

Substance3D - Stager versions 3.1.1 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

Dangling pointer

Substance3D Stager 3.1.1 OOB Read & ASLR Bypass
CVE-2025-43551 5.5 - Medium - May 13, 2025

Substance3D - Stager versions 3.1.1 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

Out-of-bounds Read

Substance3D Stager 3.1.1 & older – UAF for code exec
CVE-2025-43568 7.8 - High - May 13, 2025

Substance3D - Stager versions 3.1.1 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

Dangling pointer

Substance3D Stager OOB Write CVE-2025-43569 (<=3.1.1)
CVE-2025-43569 7.8 - High - May 13, 2025

Substance3D - Stager versions 3.1.1 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

Memory Corruption

Use-After-Free in Substance3D Stager <3.1.1 Enables Arbitrary Code Exec
CVE-2025-43570 7.8 - High - May 13, 2025

Substance3D - Stager versions 3.1.1 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

Dangling pointer

Use After Free in Substance3D Stager <=3.1.1 (CVE-2025-43549)
CVE-2025-43549 7.8 - High - May 13, 2025

Substance3D - Stager versions 3.1.1 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

Dangling pointer

Substance3D Stager <3.1.0 NULL Pointr Deref DoS
CVE-2025-21155 5.5 - Medium - February 11, 2025

Substance3D - Stager versions 3.1.0 and earlier are affected by a NULL Pointer Dereference vulnerability that could result in an application denial-of-service. An attacker could exploit this vulnerability to crash the application, leading to a denial-of-service condition. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

NULL Pointer Dereference

Substance3D Stager <3.0.4 OOB write -> arbitrary code exec
CVE-2025-21131 7.8 - High - January 14, 2025

Substance3D - Stager versions 3.0.4 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

Memory Corruption

Substance3D Stager OOB Write CVE-2025-21132 (v3.0.4)
CVE-2025-21132 7.8 - High - January 14, 2025

Substance3D - Stager versions 3.0.4 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

Memory Corruption

Substance3D Stager <3.0.4: OOB Write Arbitrary Code Exec
CVE-2025-21130 7.8 - High - January 14, 2025

Substance3D - Stager versions 3.0.4 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

Memory Corruption

Substance3D Stager <=3.0.4: Heap Buffer Overflow (arbitrary code exec)
CVE-2025-21129 7.8 - High - January 14, 2025

Substance3D - Stager versions 3.0.4 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

Memory Corruption

Substance3D Stager <=3.0.4: Stack Bufov Vulnerability (User Interaction)
CVE-2025-21128 7.8 - High - January 14, 2025

Substance3D - Stager versions 3.0.4 and earlier are affected by a Stack-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

Memory Corruption

Substance3D Stager OOB Read in <3.0.2 (CVE-2024-52998)
CVE-2024-52998 5.5 - Medium - November 22, 2024

Substance3D - Stager versions 3.0.2 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

Out-of-bounds Read

Substance3D Stager OOB CVE-2024-45141 (3.0.3)
CVE-2024-45141 7.8 - High - October 09, 2024

Substance3D - Stager versions 3.0.3 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

Memory Corruption

CVE-2024-45140: OOB Write in Adobe Substance3D Stager <3.0.3
CVE-2024-45140 7.8 - High - October 09, 2024

Substance3D - Stager versions 3.0.3 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

Memory Corruption

Substance3D Stager 3.0.3 Heap BF Overflow
CVE-2024-45139 7.8 - High - October 09, 2024

Substance3D - Stager versions 3.0.3 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

Memory Corruption

Substance3D Write-what-where Vulnerability (3.0.3) Enables Code Exec
CVE-2024-45142 7.8 - High - October 09, 2024

Substance3D - Stager versions 3.0.3 and earlier are affected by a Write-what-where Condition vulnerability that could allow an attacker to execute arbitrary code in the context of the current user. This vulnerability allows an attacker to write a controlled value to an arbitrary memory location, potentially leading to code execution. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

Write-what-where Condition

UAF in Substance 3D Stager 3.0.3 Arbitrary Code Exec
CVE-2024-45138 7.8 - High - October 09, 2024

Substance3D - Stager versions 3.0.3 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

Dangling pointer

Substance3D Stager <=3.0.3 Heap Buffer Overflow
CVE-2024-45143 7.8 - High - October 09, 2024

Substance3D - Stager versions 3.0.3 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

Memory Corruption

Substance3D Stager OOB Write CVE-2024-45144 - arbitrary code exec before 3.0.3
CVE-2024-45144 7.8 - High - October 09, 2024

Substance3D - Stager versions 3.0.3 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

Memory Corruption

Out-of-bounds write CVE-2024-45152 in Substance3D Stager 3.0.3 (code exec)
CVE-2024-45152 7.8 - High - October 09, 2024

Substance3D - Stager versions 3.0.3 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

Memory Corruption

Substance3D Stager 3.0.2 UAF & Code Exec (User Interaction)
CVE-2024-39388 7.8 - High - August 14, 2024

Substance3D - Stager versions 3.0.2 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

Dangling pointer

Substance3D Stager <=2.1.4 OOBW CVE-2024-34115
CVE-2024-34115 7.8 - High - June 13, 2024

Substance3D - Stager versions 2.1.4 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

Memory Corruption

Adobe Substance 3D Stager 2.1.3 OOB Read ASLR Bypass
CVE-2024-20715 5.5 - Medium - January 10, 2024

Adobe Substance 3D Stager versions 2.1.3 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

Out-of-bounds Read

Substance3D Stager <=2.1.3 OOB Read ASLR Bypass Vulnerability
CVE-2024-20714 5.5 - Medium - January 10, 2024

Adobe Substance 3D Stager versions 2.1.3 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

Out-of-bounds Read

Stay on top of Security Vulnerabilities

Want an email whenever new vulnerabilities are published for Adobe Substance 3d Stager or by Adobe? Click the Watch button to subscribe.

Adobe
Vendor

subscribe