The vulnerability exists due to an out-of-bounds write defect when processing untrusted structures within corrupted project components. If a local attacker induces a user into importing or rendering a specially crafted file inside Adobe After Effects, the memory corruption can facilitate arbitrary code execution in the context of the active user session.