Skip to main content

CVE-2025-46872: Cross-site Scripting (DOM-based XSS) (CWE-79) in Adobe Adobe Experience Manager

Medium
VulnerabilityCVE-2025-46872cvecve-2025-46872cwe-79
Published: Tue Jun 10 2025 (06/10/2025, 22:19:25 UTC)
Source: CVE Database V5
Vendor/Project: Adobe
Product: Adobe Experience Manager

Description

Adobe Experience Manager versions 6.5.22 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field.

AI-Powered Analysis

AILast updated: 07/11/2025, 18:32:57 UTC

Technical Analysis

CVE-2025-46872 is a stored Cross-Site Scripting (XSS) vulnerability affecting Adobe Experience Manager (AEM) versions 6.5.22 and earlier. This vulnerability arises from insufficient input sanitization in certain form fields within AEM, allowing a low-privileged attacker to inject malicious JavaScript code that is persistently stored on the server. When a victim user accesses a page containing the compromised form field, the malicious script executes in their browser context. This DOM-based XSS attack can lead to the theft of session tokens, user impersonation, unauthorized actions performed on behalf of the user, or the delivery of further malware payloads. The vulnerability requires low privileges to exploit but does require user interaction, as the victim must visit the affected page. The CVSS 3.1 base score is 5.4 (medium severity), reflecting network attack vector, low attack complexity, low privileges required, and user interaction needed. The scope is changed, indicating the vulnerability affects components beyond the initially vulnerable module. No known exploits are reported in the wild yet, and no patches have been linked at the time of publication. Given AEM’s role as a content management system widely used to build and manage enterprise websites and portals, exploitation could compromise the confidentiality and integrity of user data and site content, as well as damage organizational reputation.

Potential Impact

For European organizations, the impact of this vulnerability can be significant, especially for those relying on Adobe Experience Manager to manage public-facing websites, intranets, or customer portals. Successful exploitation could lead to unauthorized access to sensitive user information, session hijacking, and potential defacement or manipulation of web content. This can result in loss of customer trust, regulatory non-compliance (notably under GDPR), and financial penalties. Additionally, compromised websites could be used as vectors for further attacks against users or internal networks. The medium severity score suggests moderate risk, but the widespread use of AEM in sectors such as government, finance, and healthcare across Europe elevates the potential impact. The requirement for user interaction and low privileges means attackers could exploit this vulnerability through social engineering or phishing campaigns targeting employees or customers.

Mitigation Recommendations

European organizations should prioritize the following mitigation steps: 1) Immediately identify and inventory all Adobe Experience Manager instances, confirming versions in use. 2) Monitor Adobe security advisories closely for official patches or updates addressing CVE-2025-46872 and apply them promptly once available. 3) In the interim, implement strict input validation and output encoding on all form fields within AEM to prevent script injection, leveraging web application firewalls (WAFs) with custom rules to detect and block suspicious payloads. 4) Conduct thorough security testing, including automated and manual penetration testing focused on XSS vectors in AEM-managed sites. 5) Educate users and administrators about the risks of clicking untrusted links and the importance of reporting suspicious activity. 6) Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in browsers accessing affected sites. 7) Review and tighten user privileges within AEM to minimize the ability of low-privileged users to inject content. These targeted actions go beyond generic advice by focusing on immediate protective controls and organizational processes tailored to AEM environments.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
adobe
Date Reserved
2025-04-30T20:47:54.950Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6848b1933cd93dcca8311de4

Added to database: 6/10/2025, 10:28:35 PM

Last enriched: 7/11/2025, 6:32:57 PM

Last updated: 8/7/2025, 2:22:02 PM

Views: 17

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats