Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-43567: Cross-site Scripting (Reflected XSS) (CWE-79) in Adobe Adobe Connect

0
Critical
VulnerabilityCVE-2025-43567cvecve-2025-43567cwe-79
Published: Tue May 13 2025 (05/13/2025, 20:32:22 UTC)
Source: CVE
Vendor/Project: Adobe
Product: Adobe Connect

Description

Adobe Connect versions 12.8 and earlier are affected by a reflected Cross-Site Scripting (XSS) vulnerability that could be abused by an attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field. A successful attacker can abuse this to achieve session takeover, increasing the confidentiality and integrity impact as high.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 21:37:26 UTC

Technical Analysis

CVE-2025-43567 is a reflected Cross-Site Scripting (XSS) vulnerability classified under CWE-79, impacting Adobe Connect versions 12.8 and earlier. This vulnerability arises because certain form fields in Adobe Connect do not properly sanitize user-supplied input, allowing attackers to inject malicious JavaScript code. When a victim accesses a crafted URL or page containing the malicious payload, the injected script executes within their browser context. This execution can lead to session hijacking, enabling attackers to steal authentication tokens or perform actions on behalf of the user, thereby compromising confidentiality and integrity. The vulnerability is remotely exploitable over the network without requiring authentication, but it does require user interaction, such as clicking a malicious link. The CVSS v3.1 base score is 9.3 (critical), reflecting the vulnerability’s high impact on confidentiality and integrity, low attack complexity, no privileges required, and user interaction needed. Although no known exploits have been reported in the wild yet, the critical nature and widespread use of Adobe Connect in enterprise environments make this a significant threat. Adobe has not yet released a patch, so organizations must rely on interim mitigations. The vulnerability affects a widely used remote collaboration platform, increasing the risk of data breaches and unauthorized access in corporate, educational, and government sectors.

Potential Impact

The impact of CVE-2025-43567 is substantial for organizations globally that rely on Adobe Connect for remote meetings, webinars, and collaboration. Successful exploitation can lead to session hijacking, allowing attackers to impersonate legitimate users, access sensitive information, and potentially manipulate meeting content or user data. This compromises confidentiality and integrity of communications and user accounts. The vulnerability does not affect availability directly but can facilitate further attacks that may disrupt services. Given Adobe Connect’s use in sectors such as education, government, healthcare, and large enterprises, the risk of data leakage and unauthorized access is significant. Attackers could leverage this vulnerability for espionage, data theft, or to gain footholds in target networks. The requirement for user interaction limits mass exploitation but targeted phishing campaigns could be highly effective. The lack of a current patch increases exposure duration and risk.

Mitigation Recommendations

1. Monitor Adobe’s official channels for security updates and apply patches immediately once released to remediate the vulnerability. 2. Implement strict input validation and output encoding on all user-supplied data in Adobe Connect forms to prevent script injection. 3. Deploy Web Application Firewalls (WAFs) with rules tuned to detect and block reflected XSS payloads targeting Adobe Connect endpoints. 4. Educate users to recognize phishing attempts and avoid clicking suspicious links, especially those purporting to be meeting invitations or collaboration requests. 5. Use Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in browsers accessing Adobe Connect. 6. Conduct regular security assessments and penetration testing focused on web application vulnerabilities in collaboration platforms. 7. Limit the exposure of Adobe Connect interfaces to trusted networks or VPNs where feasible to reduce attack surface. 8. Monitor logs for unusual activity that may indicate exploitation attempts or session hijacking.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
adobe
Date Reserved
2025-04-16T16:23:13.180Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0fb1484d88663aec7e7

Added to database: 5/20/2025, 6:59:07 PM

Last enriched: 2/26/2026, 9:37:26 PM

Last updated: 3/28/2026, 10:55:59 AM

Views: 61

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses