Skip to main content

CVE-2025-46887: Cross-site Scripting (Stored XSS) (CWE-79) in Adobe Adobe Experience Manager

Medium
VulnerabilityCVE-2025-46887cvecve-2025-46887cwe-79
Published: Tue Jun 10 2025 (06/10/2025, 22:19:45 UTC)
Source: CVE Database V5
Vendor/Project: Adobe
Product: Adobe Experience Manager

Description

Adobe Experience Manager versions 6.5.22 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field.

AI-Powered Analysis

AILast updated: 07/11/2025, 17:32:33 UTC

Technical Analysis

CVE-2025-46887 is a stored Cross-Site Scripting (XSS) vulnerability affecting Adobe Experience Manager (AEM) versions 6.5.22 and earlier. This vulnerability allows a low-privileged attacker to inject malicious JavaScript code into vulnerable form fields within the AEM interface. When a victim subsequently accesses a page containing the compromised form field, the injected script executes in their browser context. The vulnerability is categorized under CWE-79, indicating improper neutralization of input during web page generation. The CVSS v3.1 base score is 5.4 (medium severity), with the vector AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N, meaning the attack can be launched remotely over the network with low attack complexity, requires low privileges, and user interaction is needed to trigger the script execution. The vulnerability impacts confidentiality and integrity by allowing script execution that could steal session tokens, perform actions on behalf of the user, or manipulate displayed content. Availability is not impacted. No known exploits in the wild have been reported yet, and no official patches are linked in the provided data, indicating organizations should prioritize monitoring and mitigation. Stored XSS in a content management system like AEM is particularly dangerous because injected scripts can persist and affect multiple users, including administrators and content editors, potentially leading to widespread compromise within an organization’s web infrastructure.

Potential Impact

For European organizations using Adobe Experience Manager, this vulnerability poses a significant risk to the confidentiality and integrity of their web applications and internal portals. A successful exploit could lead to session hijacking, unauthorized actions performed with user privileges, and potential data leakage. Given that AEM is widely used by enterprises and public sector organizations in Europe for managing digital content and customer experiences, exploitation could disrupt business operations and damage reputation. The stored nature of the XSS increases the risk of persistent attacks affecting multiple users over time. Additionally, if attackers leverage this vulnerability to escalate privileges or move laterally within the network, it could lead to broader compromise. The requirement for low privileges to exploit means that even less privileged users or external attackers who gain limited access could attempt exploitation. The need for user interaction (visiting a maliciously crafted page) means social engineering or phishing could be used to trigger the attack. Overall, the threat could impact sectors such as government, finance, healthcare, and media organizations in Europe that rely on AEM for critical web services.

Mitigation Recommendations

1. Immediate mitigation should include applying any available security patches from Adobe as soon as they are released. Since no patch links are provided, organizations should monitor Adobe’s security advisories closely. 2. Implement strict input validation and output encoding on all form fields within AEM to prevent injection of malicious scripts. 3. Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in browsers. 4. Limit user privileges within AEM to the minimum necessary, reducing the risk posed by low-privileged attackers. 5. Conduct regular security audits and penetration testing focused on XSS vulnerabilities in AEM deployments. 6. Educate users about phishing and social engineering risks to reduce the chance of triggering the XSS payload. 7. Monitor web application logs and user activity for unusual behavior that may indicate exploitation attempts. 8. Consider implementing Web Application Firewalls (WAFs) with rules designed to detect and block XSS payloads targeting AEM. 9. Use security headers such as HttpOnly and Secure flags on cookies to protect session tokens from theft via XSS.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
adobe
Date Reserved
2025-04-30T20:47:54.953Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6848b1943cd93dcca8311e25

Added to database: 6/10/2025, 10:28:36 PM

Last enriched: 7/11/2025, 5:32:33 PM

Last updated: 8/15/2025, 3:46:20 PM

Views: 18

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats