Just to walk this CVE back a bit…
It’s an attention grabbing PoC
- Upload a crafted PDF file containing embedded JavaScript.
- Observe that JavaScript from the PDF executes in the browser.
But what does Umbraco have to do with that? You could upload the file anywhere - in fact, you can download the PoC file from GitHub… does that mean GitHub is vulnerable to a CWE-434…? No, and neither is Umbraco.
The product allows the upload or transfer of dangerous file types that are automatically processed within its environment.
Emphasis mine, this doesn’t pass the test.
Now, let’s have a gander at the XSS (Cross Site Scripting) claim. Where does the JavaScript actually run? In the browser, sure, but it’s not run in the context of the Umbraco site. It’s sandboxed by the browser and not treated like it’s running on your domain..
It’s not JavaScript as we know it either. It doesn’t have access to any important browser APIs - i.e. no fetch() or document.cookies etc. in fact if you look at the alert itself you’ll see it’s calling app.alert()… that’s not a web browser API but a PDF one 
I’ve not got time to craft a PDF (especially one that I know won’t work) but you’ll quickly find that if you try and call any APIs that could present a real risk to the user that the browser will block it.
Even if you could, that CVE would really be the browser’s problem, not Umbraco’s.
Obviously there’s still a potential social engineering/phishing angle with these crafted PDFs… but that’s a whole different issue.
Edit: If anyone is feeling extra nerdy, here’s a fun design doc for the PDF Viewer in Chromium that talks about the sandboxing, what kinds of JavaScript execution are allowed, and why.