CVE-2025-46910: Cross-site Scripting (Stored XSS) (CWE-79) in Adobe Adobe Experience Manager
Adobe Experience Manager versions 6.5.22 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field.
AI Analysis
Technical Summary
CVE-2025-46910 is a stored Cross-Site Scripting (XSS) vulnerability affecting Adobe Experience Manager (AEM) versions 6.5.22 and earlier. This vulnerability allows a low-privileged attacker to inject malicious JavaScript code into vulnerable form fields within the AEM interface. When a victim user accesses the affected page containing the injected script, the malicious code executes in their browser context. The vulnerability is classified as CWE-79, indicating improper neutralization of input leading to script injection. The CVSS 3.1 base score is 5.4 (medium severity), with an attack vector of network (remote exploitation), low attack complexity, requiring low privileges, and user interaction (victim must visit the compromised page). The scope is changed, meaning the vulnerability can affect resources beyond the initially vulnerable component. The impact affects confidentiality and integrity, allowing potential theft of session tokens, user impersonation, or unauthorized actions executed in the victim’s browser context. Availability is not impacted. No known exploits are currently reported in the wild, and no patches or fixes are linked yet. Stored XSS vulnerabilities are particularly dangerous in web content management systems like AEM because they can persistently affect multiple users and potentially administrators, enabling widespread impact if exploited. Given AEM’s role in managing digital content and websites, exploitation could lead to defacement, data leakage, or further compromise of internal systems through chained attacks.
Potential Impact
For European organizations using Adobe Experience Manager, this vulnerability poses a significant risk to the confidentiality and integrity of their web portals and internal content management workflows. Attackers exploiting this flaw could hijack user sessions, steal sensitive information, or perform unauthorized actions on behalf of users, including administrators. This could lead to data breaches, reputational damage, and regulatory non-compliance under GDPR if personal data is exposed. Since AEM is widely used by enterprises, government agencies, and large institutions across Europe for digital experience management, the impact could be broad, affecting public sector websites, e-commerce platforms, and corporate intranets. The medium severity rating indicates moderate risk, but the potential for chained attacks or social engineering to increase impact exists. The requirement for user interaction (visiting a malicious page) means phishing or targeted campaigns could be used to trigger exploitation. The absence of known exploits currently provides a window for proactive mitigation before widespread attacks occur.
Mitigation Recommendations
European organizations should immediately audit their Adobe Experience Manager installations to identify versions 6.5.22 or earlier in use. Until an official patch is released, organizations should implement strict input validation and output encoding on all user-supplied data in AEM forms to prevent script injection. Employ Content Security Policy (CSP) headers to restrict execution of unauthorized scripts in browsers. Limit user privileges to the minimum necessary, especially for users who can submit or approve content. Monitor web server and application logs for unusual input patterns or error messages indicative of attempted XSS exploitation. Educate users on the risks of clicking unknown links or visiting untrusted pages to reduce the risk of social engineering. Once Adobe releases a security update, prioritize patching to remediate the vulnerability. Additionally, consider deploying web application firewalls (WAFs) with rules to detect and block XSS payloads targeting AEM. Conduct regular security assessments and penetration testing focused on web application vulnerabilities to detect similar issues proactively.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden, Belgium
CVE-2025-46910: Cross-site Scripting (Stored XSS) (CWE-79) in Adobe Adobe Experience Manager
Description
Adobe Experience Manager versions 6.5.22 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field.
AI-Powered Analysis
Technical Analysis
CVE-2025-46910 is a stored Cross-Site Scripting (XSS) vulnerability affecting Adobe Experience Manager (AEM) versions 6.5.22 and earlier. This vulnerability allows a low-privileged attacker to inject malicious JavaScript code into vulnerable form fields within the AEM interface. When a victim user accesses the affected page containing the injected script, the malicious code executes in their browser context. The vulnerability is classified as CWE-79, indicating improper neutralization of input leading to script injection. The CVSS 3.1 base score is 5.4 (medium severity), with an attack vector of network (remote exploitation), low attack complexity, requiring low privileges, and user interaction (victim must visit the compromised page). The scope is changed, meaning the vulnerability can affect resources beyond the initially vulnerable component. The impact affects confidentiality and integrity, allowing potential theft of session tokens, user impersonation, or unauthorized actions executed in the victim’s browser context. Availability is not impacted. No known exploits are currently reported in the wild, and no patches or fixes are linked yet. Stored XSS vulnerabilities are particularly dangerous in web content management systems like AEM because they can persistently affect multiple users and potentially administrators, enabling widespread impact if exploited. Given AEM’s role in managing digital content and websites, exploitation could lead to defacement, data leakage, or further compromise of internal systems through chained attacks.
Potential Impact
For European organizations using Adobe Experience Manager, this vulnerability poses a significant risk to the confidentiality and integrity of their web portals and internal content management workflows. Attackers exploiting this flaw could hijack user sessions, steal sensitive information, or perform unauthorized actions on behalf of users, including administrators. This could lead to data breaches, reputational damage, and regulatory non-compliance under GDPR if personal data is exposed. Since AEM is widely used by enterprises, government agencies, and large institutions across Europe for digital experience management, the impact could be broad, affecting public sector websites, e-commerce platforms, and corporate intranets. The medium severity rating indicates moderate risk, but the potential for chained attacks or social engineering to increase impact exists. The requirement for user interaction (visiting a malicious page) means phishing or targeted campaigns could be used to trigger exploitation. The absence of known exploits currently provides a window for proactive mitigation before widespread attacks occur.
Mitigation Recommendations
European organizations should immediately audit their Adobe Experience Manager installations to identify versions 6.5.22 or earlier in use. Until an official patch is released, organizations should implement strict input validation and output encoding on all user-supplied data in AEM forms to prevent script injection. Employ Content Security Policy (CSP) headers to restrict execution of unauthorized scripts in browsers. Limit user privileges to the minimum necessary, especially for users who can submit or approve content. Monitor web server and application logs for unusual input patterns or error messages indicative of attempted XSS exploitation. Educate users on the risks of clicking unknown links or visiting untrusted pages to reduce the risk of social engineering. Once Adobe releases a security update, prioritize patching to remediate the vulnerability. Additionally, consider deploying web application firewalls (WAFs) with rules to detect and block XSS payloads targeting AEM. Conduct regular security assessments and penetration testing focused on web application vulnerabilities to detect similar issues proactively.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- adobe
- Date Reserved
- 2025-04-30T20:47:54.957Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6848b1953cd93dcca8311e78
Added to database: 6/10/2025, 10:28:37 PM
Last enriched: 7/11/2025, 4:17:05 PM
Last updated: 8/9/2025, 12:32:57 PM
Views: 16
Related Threats
CVE-2025-9091: Hard-coded Credentials in Tenda AC20
LowCVE-2025-9090: Command Injection in Tenda AC20
MediumCVE-2025-9092: CWE-400 Uncontrolled Resource Consumption in Legion of the Bouncy Castle Inc. Bouncy Castle for Java - BC-FJA 2.1.0
LowCVE-2025-9089: Stack-based Buffer Overflow in Tenda AC20
HighCVE-2025-9088: Stack-based Buffer Overflow in Tenda AC20
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.