Adobe ColdFusion SubscribeToEndpoints Authentication Bypass (CVE-2026-27282) Patched
Adobe has released a security update for ColdFusion to fix CVE-2026-27282, an authentication bypass vulnerability in the subscribeToEndpoints method that could allow unauthenticated remote attackers to delete arbitrary files.

Adobe has released a security update to address CVE-2026-27282, an authentication bypass vulnerability in ColdFusion that was disclosed by the Zero Day Initiative (ZDI) on April 15, 2026. The flaw, cataloged as ZDI-26-263, resides in the subscribeToEndpoints method and allows an unauthenticated remote attacker to bypass authentication entirely. While the vulnerability itself does not directly enable code execution, it can be chained with other weaknesses to delete arbitrary files on the target system in the context of the ColdFusion service account.
The specific issue stems from a missing critical step during the authentication process within the subscribeToEndpoints method. Because the method fails to properly verify the caller's identity, an attacker can invoke it without any credentials. The CVSS score for CVE-2026-27282 is 6.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L), reflecting the low complexity of exploitation and the fact that no user interaction is required. The impact is limited to integrity and availability, as the vulnerability does not allow direct data exfiltration.
Adobe has addressed the vulnerability in its April 2026 security bulletin APSB26-38. Administrators are strongly advised to apply the update immediately, as the technical details of the flaw are now public. The vulnerability was reported to Adobe on March 26, 2026, by Jonathan Lein of TrendAI Research, and the coordinated disclosure followed the standard 90-day timeline.
ColdFusion is a widely used application server and rapid development platform, particularly in enterprise environments for building dynamic web applications. Authentication bypass vulnerabilities in such platforms are especially dangerous because they can serve as an initial foothold for attackers. While Adobe has not reported active exploitation of CVE-2026-27282 in the wild, the public availability of the advisory and the low barrier to exploitation make it a likely target for threat actors.
Organizations running Adobe ColdFusion should prioritize patching, especially if the server is exposed to the internet. As a temporary mitigation, administrators can restrict network access to the ColdFusion administrative interfaces and monitor for unusual file deletion events. The vulnerability underscores the importance of rigorous authentication checks in enterprise software, particularly in methods that handle subscription or endpoint management functionality.