Skip to main content

CVE-2023-48484: Cross-site Scripting (DOM-based XSS) (CWE-79) in Adobe Adobe Experience Manager

Medium
VulnerabilityCVE-2023-48484cvecve-2023-48484cwe-79
Published: Fri Dec 15 2023 (12/15/2023, 10:15:34 UTC)
Source: CVE
Vendor/Project: Adobe
Product: Adobe Experience Manager

Description

Adobe Experience Manager versions 6.5.18 and earlier are affected by a Cross-site Scripting (DOM-based XSS) vulnerability. If a low-privileged attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser.

AI-Powered Analysis

AILast updated: 07/07/2025, 15:28:54 UTC

Technical Analysis

CVE-2023-48484 is a DOM-based Cross-site Scripting (XSS) vulnerability affecting Adobe Experience Manager (AEM) versions 6.5.18 and earlier. This vulnerability arises when an attacker crafts a malicious URL referencing a vulnerable page within AEM. If a low-privileged attacker convinces a victim to visit this URL, the malicious JavaScript embedded in the URL can execute within the victim's browser context. The vulnerability is classified under CWE-79, indicating improper neutralization of input leading to script injection. The attack exploits the Document Object Model (DOM) of the web application, meaning the malicious script is executed as a result of client-side code processing untrusted input without proper sanitization. The CVSS v3.1 base score is 5.4 (medium severity), with vector AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N. This means the attack can be launched remotely over the network with low attack complexity, requires low privileges, and user interaction (clicking the malicious link) is necessary. The scope is changed (S:C), indicating that the vulnerability can affect components beyond the initially vulnerable component. The impact affects confidentiality and integrity to a limited extent, with no impact on availability. No known exploits are currently reported in the wild, and no patches or updates have been linked yet. This vulnerability is significant because AEM is widely used by enterprises for content management and digital experience delivery, and exploitation could lead to session hijacking, data theft, or unauthorized actions performed in the victim's browser context.

Potential Impact

For European organizations using Adobe Experience Manager, this vulnerability poses a risk of client-side attacks that can compromise user sessions and data confidentiality. Since AEM is often used to manage customer-facing websites and internal portals, exploitation could lead to unauthorized access to sensitive information, defacement of web content, or distribution of malware through trusted domains. The medium severity score reflects that while the attack requires user interaction and low privileges, the potential for lateral impact exists due to scope change. European organizations in sectors such as finance, government, healthcare, and e-commerce that rely on AEM for digital services could face reputational damage, regulatory scrutiny under GDPR if personal data is compromised, and operational disruptions. The absence of known exploits currently reduces immediate risk, but the public disclosure increases the likelihood of future exploitation attempts, especially targeting users via phishing or social engineering campaigns.

Mitigation Recommendations

Organizations should immediately identify all instances of Adobe Experience Manager 6.5.18 or earlier in their environment. Given the lack of an official patch at the time of this report, temporary mitigations include implementing strict Content Security Policy (CSP) headers to restrict script execution sources and reduce the impact of injected scripts. Web Application Firewalls (WAFs) should be configured to detect and block suspicious URL patterns that may exploit DOM-based XSS. Security teams should educate users about the risks of clicking unsolicited links and implement email filtering to reduce phishing attempts. Additionally, developers should review and sanitize all client-side input handling in AEM customizations to prevent DOM-based injection. Monitoring logs for unusual URL parameters and anomalous user behavior can help detect exploitation attempts. Once Adobe releases a patch, organizations must prioritize timely deployment. Regular security assessments and penetration testing focusing on client-side vulnerabilities in AEM deployments are recommended to proactively identify and remediate similar issues.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
adobe
Date Reserved
2023-11-16T23:29:25.373Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682de546c4522896dcbfffa5

Added to database: 5/21/2025, 2:37:58 PM

Last enriched: 7/7/2025, 3:28:54 PM

Last updated: 8/8/2025, 10:56:06 AM

Views: 15

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats