Skip to main content

CVE-2025-46905: Cross-site Scripting (Stored XSS) (CWE-79) in Adobe Adobe Experience Manager

Medium
VulnerabilityCVE-2025-46905cvecve-2025-46905cwe-79
Published: Tue Jun 10 2025 (06/10/2025, 22:20:09 UTC)
Source: CVE Database V5
Vendor/Project: Adobe
Product: Adobe Experience Manager

Description

Adobe Experience Manager versions 6.5.22 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field.

AI-Powered Analysis

AILast updated: 07/11/2025, 16:19:27 UTC

Technical Analysis

CVE-2025-46905 is a stored Cross-Site Scripting (XSS) vulnerability identified in Adobe Experience Manager (AEM) versions 6.5.22 and earlier. This vulnerability arises from insufficient input sanitization in certain form fields within AEM, allowing a low-privileged attacker to inject malicious JavaScript code that is persistently stored on the server. When a victim user accesses the affected page containing the malicious payload, the injected script executes in their browser context. The vulnerability is classified under CWE-79, indicating improper neutralization of input during web page generation. The CVSS v3.1 base score is 5.4 (medium severity), with the vector indicating network attack vector (AV:N), low attack complexity (AC:L), requiring low privileges (PR:L), user interaction required (UI:R), scope changed (S:C), and impacts on confidentiality and integrity (C:L, I:L) but no impact on availability (A:N). The scope change means the vulnerability affects resources beyond the initially vulnerable component, potentially impacting other parts of the system or users. Although no known exploits are currently reported in the wild, the nature of stored XSS vulnerabilities makes them attractive for attackers aiming to hijack user sessions, steal sensitive data, or perform actions on behalf of users within the trusted domain. Adobe has not yet published patches for this vulnerability as of the provided data. The vulnerability affects a widely used enterprise content management system that is often integrated into corporate intranets, public websites, and customer portals, making it a significant concern for organizations relying on AEM for digital experience management.

Potential Impact

For European organizations, the impact of this stored XSS vulnerability in Adobe Experience Manager can be substantial. AEM is widely used by enterprises, government agencies, and public sector organizations across Europe to manage web content and digital experiences. Exploitation could lead to unauthorized disclosure of sensitive information, such as user credentials, personal data, or internal documents, violating GDPR and other data protection regulations. Attackers could also perform actions on behalf of authenticated users, potentially leading to privilege escalation or unauthorized transactions. The scope change in the vulnerability increases the risk of cross-application impact within the affected environment. Additionally, reputational damage and loss of customer trust could result from successful attacks, especially for organizations with public-facing websites or portals. The requirement for user interaction means phishing or social engineering could be used to lure victims to vulnerable pages, increasing the attack surface. Given the medium severity score, the threat should not be underestimated, especially in environments where AEM is integrated with other critical systems or handles sensitive data.

Mitigation Recommendations

European organizations should prioritize the following mitigation steps: 1) Immediate assessment of Adobe Experience Manager instances to identify versions 6.5.22 or earlier in use. 2) Implement strict input validation and output encoding on all form fields and user-generated content within AEM to prevent script injection. 3) Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in browsers, reducing the impact of potential XSS payloads. 4) Monitor web application logs and user activity for unusual behavior indicative of XSS exploitation attempts. 5) Educate users about the risks of clicking on suspicious links or interacting with untrusted content to reduce successful user interaction exploitation. 6) Prepare for timely patch deployment once Adobe releases official fixes, including testing in staging environments to ensure compatibility. 7) Consider deploying Web Application Firewalls (WAF) with rules tailored to detect and block XSS attack patterns targeting AEM. 8) Review and tighten access controls to limit low-privileged user capabilities that could be leveraged to inject malicious content. These measures, combined, will reduce the likelihood and impact of exploitation until patches are available.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
adobe
Date Reserved
2025-04-30T20:47:54.956Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6848b1943cd93dcca8311e5f

Added to database: 6/10/2025, 10:28:36 PM

Last enriched: 7/11/2025, 4:19:27 PM

Last updated: 8/16/2025, 2:28:28 AM

Views: 17

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats