CVE-2025-46914: Cross-site Scripting (Stored XSS) (CWE-79) in Adobe Adobe Experience Manager
Adobe Experience Manager versions 6.5.22 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field.
AI Analysis
Technical Summary
CVE-2025-46914 is a stored Cross-Site Scripting (XSS) vulnerability affecting Adobe Experience Manager (AEM) versions 6.5.22 and earlier. This vulnerability arises due to insufficient input sanitization in certain form fields within AEM, allowing a low-privileged attacker to inject malicious JavaScript code that is persistently stored on the server. When a victim user accesses a page containing the compromised form field, the malicious script executes in their browser context. This stored XSS flaw can lead to unauthorized actions such as session hijacking, credential theft, or performing actions on behalf of the victim user. The vulnerability has a CVSS 3.1 base score of 5.4 (medium severity), with the vector indicating network attack vector (AV:N), low attack complexity (AC:L), requiring low privileges (PR:L), user interaction (UI:R), scope changed (S:C), and impacts on confidentiality and integrity (C:L/I:L) but no impact on availability (A:N). No known exploits are currently reported in the wild, and no official patches have been linked yet. The vulnerability is classified under CWE-79, which covers improper neutralization of input during web page generation. Given AEM’s role as a content management system widely used by enterprises for web content delivery, exploitation could allow attackers to compromise user sessions and potentially pivot to further attacks within affected organizations.
Potential Impact
For European organizations, the impact of this vulnerability can be significant, especially for those relying on Adobe Experience Manager to manage public-facing websites or internal portals. Exploitation could lead to theft of sensitive user data, including authentication tokens or personal information, undermining user trust and violating data protection regulations such as GDPR. The ability to execute arbitrary scripts in users’ browsers may facilitate phishing attacks, drive-by malware infections, or unauthorized actions performed with the victim’s privileges. This could result in reputational damage, regulatory fines, and operational disruptions. Organizations in sectors like finance, government, healthcare, and e-commerce, which often use AEM for content management, are particularly at risk. The medium severity score reflects that while exploitation requires some user interaction and low privileges, the scope change and confidentiality/integrity impacts warrant prompt attention.
Mitigation Recommendations
Organizations should prioritize the following mitigations: 1) Monitor Adobe’s official security advisories for patches addressing CVE-2025-46914 and apply updates promptly once available. 2) In the interim, implement strict input validation and output encoding on all user-supplied data in AEM forms to prevent script injection. 3) Employ Content Security Policy (CSP) headers to restrict execution of unauthorized scripts in browsers. 4) Conduct thorough security testing of AEM instances, including penetration testing focused on XSS vectors. 5) Educate users about the risks of interacting with suspicious content and implement multi-factor authentication to reduce impact of session hijacking. 6) Review and limit privileges of users who can submit content to minimize attack surface. 7) Use web application firewalls (WAFs) with rules tuned to detect and block XSS payloads targeting AEM. These steps go beyond generic advice by focusing on compensating controls and proactive monitoring until official patches are deployed.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden, Belgium
CVE-2025-46914: Cross-site Scripting (Stored XSS) (CWE-79) in Adobe Adobe Experience Manager
Description
Adobe Experience Manager versions 6.5.22 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field.
AI-Powered Analysis
Technical Analysis
CVE-2025-46914 is a stored Cross-Site Scripting (XSS) vulnerability affecting Adobe Experience Manager (AEM) versions 6.5.22 and earlier. This vulnerability arises due to insufficient input sanitization in certain form fields within AEM, allowing a low-privileged attacker to inject malicious JavaScript code that is persistently stored on the server. When a victim user accesses a page containing the compromised form field, the malicious script executes in their browser context. This stored XSS flaw can lead to unauthorized actions such as session hijacking, credential theft, or performing actions on behalf of the victim user. The vulnerability has a CVSS 3.1 base score of 5.4 (medium severity), with the vector indicating network attack vector (AV:N), low attack complexity (AC:L), requiring low privileges (PR:L), user interaction (UI:R), scope changed (S:C), and impacts on confidentiality and integrity (C:L/I:L) but no impact on availability (A:N). No known exploits are currently reported in the wild, and no official patches have been linked yet. The vulnerability is classified under CWE-79, which covers improper neutralization of input during web page generation. Given AEM’s role as a content management system widely used by enterprises for web content delivery, exploitation could allow attackers to compromise user sessions and potentially pivot to further attacks within affected organizations.
Potential Impact
For European organizations, the impact of this vulnerability can be significant, especially for those relying on Adobe Experience Manager to manage public-facing websites or internal portals. Exploitation could lead to theft of sensitive user data, including authentication tokens or personal information, undermining user trust and violating data protection regulations such as GDPR. The ability to execute arbitrary scripts in users’ browsers may facilitate phishing attacks, drive-by malware infections, or unauthorized actions performed with the victim’s privileges. This could result in reputational damage, regulatory fines, and operational disruptions. Organizations in sectors like finance, government, healthcare, and e-commerce, which often use AEM for content management, are particularly at risk. The medium severity score reflects that while exploitation requires some user interaction and low privileges, the scope change and confidentiality/integrity impacts warrant prompt attention.
Mitigation Recommendations
Organizations should prioritize the following mitigations: 1) Monitor Adobe’s official security advisories for patches addressing CVE-2025-46914 and apply updates promptly once available. 2) In the interim, implement strict input validation and output encoding on all user-supplied data in AEM forms to prevent script injection. 3) Employ Content Security Policy (CSP) headers to restrict execution of unauthorized scripts in browsers. 4) Conduct thorough security testing of AEM instances, including penetration testing focused on XSS vectors. 5) Educate users about the risks of interacting with suspicious content and implement multi-factor authentication to reduce impact of session hijacking. 6) Review and limit privileges of users who can submit content to minimize attack surface. 7) Use web application firewalls (WAFs) with rules tuned to detect and block XSS payloads targeting AEM. These steps go beyond generic advice by focusing on compensating controls and proactive monitoring until official patches are deployed.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- adobe
- Date Reserved
- 2025-04-30T20:47:54.964Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6848b1953cd93dcca8311e84
Added to database: 6/10/2025, 10:28:37 PM
Last enriched: 7/11/2025, 4:05:48 PM
Last updated: 10/7/2025, 1:44:34 PM
Views: 29
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
Hackers Stole Data From Public Safety Comms Firm BK Technologies
MediumCVE-2025-11396: SQL Injection in code-projects Simple Food Ordering System
MediumCVE-2025-40889: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Nozomi Networks Guardian
HighCVE-2025-40888: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Nozomi Networks Guardian
MediumCVE-2025-40887: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Nozomi Networks Guardian
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.