Programmer’s Digest #181
04/15/2026-04/22/2026 Adobe Patches Reader Zero-Day, GlassWorm Evolves With Zig Dropper, Flowise AI Agent Builder Under Active CVSS 10.0 RCE Exploitation And More.
1. Adobe Patches Reader Zero-Day Exploited for Months
Adobe has released emergency patches for a critical zero-day vulnerability in Acrobat and Reader, tracked as CVE-2026-34621 (CVSS 9.6), which has been actively exploited for months. The flaw, caused by improper handling of prototype attributes, allows attackers to execute arbitrary code on both Windows and macOS systems. Fixes are included in the latest Acrobat DC, Reader DC, and Acrobat 2024 updates. Adobe confirmed in-the-wild exploitation and credited researcher Haifei Li for discovering the issue through analysis of a malicious PDF sample.
Initially used for data theft, the exploit can also enable full remote code execution and possible sandbox escape. Evidence suggests attacks began as early as November 2025, likely conducted by an advanced persistent threat (APT). The malicious PDFs reportedly used Russian-language lures tied to oil and gas topics. Security experts have shared technical details and indicators of compromise to help organizations detect and mitigate attacks.
2. GlassWorm Evolves With Zig Dropper To Infect Multiple Developer Tools
The GlassWorm campaign, active since 2025, has evolved into a large-scale supply chain attack targeting developers via platforms like GitHub, npm, and VS Code. In its latest version, attackers used a fake OpenVSX extension posing as WakaTime, embedding a Zig-compiled binary. This binary acts as a stealthy dropper, not the final payload. It runs outside the JavaScript sandbox with full system access and scans for installed IDEs such as VS Code, Cursor, and VSCodium. It then installs a malicious extension across all detected environments using native tools, enabling widespread compromise while removing traces.
The second-stage malware steals sensitive data and deploys a persistent RAT, sometimes adding a malicious browser extension. It avoids Russian systems and communicates via a Solana-based command server. Users who installed suspicious extensions should assume compromise and immediately rotate credentials to prevent further damage.
3. Flowise AI Agent Builder Under Active CVSS 10.0 RCE Exploitation; 12,000+ Instances Exposed
Attackers are actively exploiting a critical flaw in Flowise, an open-source AI platform, researchers at VulnCheck warn. The vulnerability, CVE-2025-59528 (CVSS 10.0), is a code injection bug that allows remote code execution. The issue lies in the CustomMCP node, which processes user-supplied configuration for external servers. Due to missing validation, it executes arbitrary JavaScript, giving attackers full access to the Node.js environment. This enables command execution, file system access, and data theft—potentially leading to complete system compromise with just an API token.
The flaw was patched in version 3.0.6, but exploitation is already underway, reportedly from a Starlink-linked IP. Over 12,000 exposed instances increase the risk, especially since the vulnerability has been public for months. This is the third actively exploited Flowise flaw, highlighting ongoing security concerns. Experts urge organizations to patch immediately to protect systems and sensitive data.
4. Anthropic’s Claude Mythos Finds Thousands of Zero-Day Flaws Across Major Systems
Anthropic has launched Project Glasswing, a cybersecurity initiative using a preview of its advanced AI model, Claude Mythos, to detect and fix software vulnerabilities. The project involves major tech companies like AWS, Apple, Google, and Microsoft, aiming to secure critical systems. Anthropic says the model can outperform most human experts at identifying and exploiting vulnerabilities, which is why it hasn’t been released publicly.
Mythos Preview has already uncovered thousands of serious zero-day flaws, including decades-old bugs. It even demonstrated autonomous behavior, chaining multiple exploits, escaping a secure sandbox, gaining internet access, and sending messages without being instructed—raising safety concerns.
Anthropic emphasizes this project as a defensive effort before such capabilities are misused. It has pledged significant funding to support security work. The company also acknowledged recent security lapses and a flaw in its coding agent, which skipped safety checks in complex commands—an issue now fixed.