CVE-2025-46914: Cross-site Scripting (Stored XSS) (CWE-79) in Adobe Adobe Experience Manager
Adobe Experience Manager versions 6.5.22 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field.
AI Analysis
Technical Summary
CVE-2025-46914 is a stored Cross-Site Scripting (XSS) vulnerability affecting Adobe Experience Manager (AEM) versions 6.5.22 and earlier. This vulnerability arises due to insufficient input sanitization in certain form fields within AEM, allowing a low-privileged attacker to inject malicious JavaScript code that is persistently stored on the server. When a victim user accesses a page containing the compromised form field, the malicious script executes in their browser context. This stored XSS flaw can lead to unauthorized actions such as session hijacking, credential theft, or performing actions on behalf of the victim user. The vulnerability has a CVSS 3.1 base score of 5.4 (medium severity), with the vector indicating network attack vector (AV:N), low attack complexity (AC:L), requiring low privileges (PR:L), user interaction (UI:R), scope changed (S:C), and impacts on confidentiality and integrity (C:L/I:L) but no impact on availability (A:N). No known exploits are currently reported in the wild, and no official patches have been linked yet. The vulnerability is classified under CWE-79, which covers improper neutralization of input during web page generation. Given AEM’s role as a content management system widely used by enterprises for web content delivery, exploitation could allow attackers to compromise user sessions and potentially pivot to further attacks within affected organizations.
Potential Impact
For European organizations, the impact of this vulnerability can be significant, especially for those relying on Adobe Experience Manager to manage public-facing websites or internal portals. Exploitation could lead to theft of sensitive user data, including authentication tokens or personal information, undermining user trust and violating data protection regulations such as GDPR. The ability to execute arbitrary scripts in users’ browsers may facilitate phishing attacks, drive-by malware infections, or unauthorized actions performed with the victim’s privileges. This could result in reputational damage, regulatory fines, and operational disruptions. Organizations in sectors like finance, government, healthcare, and e-commerce, which often use AEM for content management, are particularly at risk. The medium severity score reflects that while exploitation requires some user interaction and low privileges, the scope change and confidentiality/integrity impacts warrant prompt attention.
Mitigation Recommendations
Organizations should prioritize the following mitigations: 1) Monitor Adobe’s official security advisories for patches addressing CVE-2025-46914 and apply updates promptly once available. 2) In the interim, implement strict input validation and output encoding on all user-supplied data in AEM forms to prevent script injection. 3) Employ Content Security Policy (CSP) headers to restrict execution of unauthorized scripts in browsers. 4) Conduct thorough security testing of AEM instances, including penetration testing focused on XSS vectors. 5) Educate users about the risks of interacting with suspicious content and implement multi-factor authentication to reduce impact of session hijacking. 6) Review and limit privileges of users who can submit content to minimize attack surface. 7) Use web application firewalls (WAFs) with rules tuned to detect and block XSS payloads targeting AEM. These steps go beyond generic advice by focusing on compensating controls and proactive monitoring until official patches are deployed.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden, Belgium
CVE-2025-46914: Cross-site Scripting (Stored XSS) (CWE-79) in Adobe Adobe Experience Manager
Description
Adobe Experience Manager versions 6.5.22 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field.
AI-Powered Analysis
Technical Analysis
CVE-2025-46914 is a stored Cross-Site Scripting (XSS) vulnerability affecting Adobe Experience Manager (AEM) versions 6.5.22 and earlier. This vulnerability arises due to insufficient input sanitization in certain form fields within AEM, allowing a low-privileged attacker to inject malicious JavaScript code that is persistently stored on the server. When a victim user accesses a page containing the compromised form field, the malicious script executes in their browser context. This stored XSS flaw can lead to unauthorized actions such as session hijacking, credential theft, or performing actions on behalf of the victim user. The vulnerability has a CVSS 3.1 base score of 5.4 (medium severity), with the vector indicating network attack vector (AV:N), low attack complexity (AC:L), requiring low privileges (PR:L), user interaction (UI:R), scope changed (S:C), and impacts on confidentiality and integrity (C:L/I:L) but no impact on availability (A:N). No known exploits are currently reported in the wild, and no official patches have been linked yet. The vulnerability is classified under CWE-79, which covers improper neutralization of input during web page generation. Given AEM’s role as a content management system widely used by enterprises for web content delivery, exploitation could allow attackers to compromise user sessions and potentially pivot to further attacks within affected organizations.
Potential Impact
For European organizations, the impact of this vulnerability can be significant, especially for those relying on Adobe Experience Manager to manage public-facing websites or internal portals. Exploitation could lead to theft of sensitive user data, including authentication tokens or personal information, undermining user trust and violating data protection regulations such as GDPR. The ability to execute arbitrary scripts in users’ browsers may facilitate phishing attacks, drive-by malware infections, or unauthorized actions performed with the victim’s privileges. This could result in reputational damage, regulatory fines, and operational disruptions. Organizations in sectors like finance, government, healthcare, and e-commerce, which often use AEM for content management, are particularly at risk. The medium severity score reflects that while exploitation requires some user interaction and low privileges, the scope change and confidentiality/integrity impacts warrant prompt attention.
Mitigation Recommendations
Organizations should prioritize the following mitigations: 1) Monitor Adobe’s official security advisories for patches addressing CVE-2025-46914 and apply updates promptly once available. 2) In the interim, implement strict input validation and output encoding on all user-supplied data in AEM forms to prevent script injection. 3) Employ Content Security Policy (CSP) headers to restrict execution of unauthorized scripts in browsers. 4) Conduct thorough security testing of AEM instances, including penetration testing focused on XSS vectors. 5) Educate users about the risks of interacting with suspicious content and implement multi-factor authentication to reduce impact of session hijacking. 6) Review and limit privileges of users who can submit content to minimize attack surface. 7) Use web application firewalls (WAFs) with rules tuned to detect and block XSS payloads targeting AEM. These steps go beyond generic advice by focusing on compensating controls and proactive monitoring until official patches are deployed.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- adobe
- Date Reserved
- 2025-04-30T20:47:54.964Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6848b1953cd93dcca8311e84
Added to database: 6/10/2025, 10:28:37 PM
Last enriched: 7/11/2025, 4:05:48 PM
Last updated: 8/13/2025, 6:02:36 AM
Views: 22
Related Threats
CVE-2025-53948: CWE-415 Double Free in Santesoft Sante PACS Server
HighCVE-2025-52584: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-46269: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-54862: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumCVE-2025-54759: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.