Skip to main content

CVE-2025-46920: Cross-site Scripting (Stored XSS) (CWE-79) in Adobe Adobe Experience Manager

Medium
VulnerabilityCVE-2025-46920cvecve-2025-46920cwe-79
Published: Tue Jun 10 2025 (06/10/2025, 22:18:21 UTC)
Source: CVE Database V5
Vendor/Project: Adobe
Product: Adobe Experience Manager

Description

Adobe Experience Manager versions 6.5.22 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field.

AI-Powered Analysis

AILast updated: 07/11/2025, 15:05:14 UTC

Technical Analysis

CVE-2025-46920 is a stored Cross-Site Scripting (XSS) vulnerability affecting Adobe Experience Manager (AEM) versions 6.5.22 and earlier. This vulnerability arises from insufficient input sanitization in certain form fields within AEM, allowing a low-privileged attacker to inject malicious JavaScript code that is persistently stored on the server. When a victim user accesses the affected page containing the malicious input, the injected script executes in their browser context. This can lead to a range of attacks including session hijacking, credential theft, unauthorized actions performed on behalf of the user, or redirection to malicious sites. The vulnerability requires the attacker to have low privileges, which lowers the barrier to exploitation, but does require user interaction as the victim must visit the compromised page. The CVSS 3.1 base score is 4.6 (medium severity), reflecting the network attack vector, low attack complexity, low privileges required, and the need for user interaction. The impact affects confidentiality and integrity but not availability. No known exploits are currently reported in the wild, and no patches have been linked yet. Given AEM's role as a content management system widely used by enterprises for web content delivery, this vulnerability poses a risk of client-side compromise and potential lateral movement if exploited in targeted attacks.

Potential Impact

For European organizations using Adobe Experience Manager, this vulnerability could lead to client-side compromise of users who access affected web pages. This includes employees, partners, or customers, potentially exposing sensitive session tokens or personal data. The exploitation could facilitate phishing campaigns, unauthorized access to internal resources, or manipulation of web content integrity. Organizations in sectors such as finance, government, healthcare, and e-commerce, which rely heavily on AEM for digital presence, may face reputational damage, regulatory scrutiny under GDPR for data breaches, and operational disruption. The medium severity score indicates moderate risk, but the widespread use of AEM in Europe amplifies the potential impact. Attackers could leverage this vulnerability to target specific users or escalate privileges within the affected environment if combined with other vulnerabilities.

Mitigation Recommendations

European organizations should prioritize the following mitigations: 1) Immediately review and restrict user input in all AEM form fields, implementing strict input validation and output encoding to prevent script injection. 2) Monitor and audit web content for unauthorized or suspicious script insertions. 3) Apply any forthcoming Adobe patches or security updates as soon as they are released. 4) Employ Content Security Policy (CSP) headers to restrict execution of unauthorized scripts in browsers. 5) Educate users to recognize suspicious web content and avoid interacting with untrusted links. 6) Use web application firewalls (WAFs) with rules tailored to detect and block XSS payloads targeting AEM. 7) Limit privileges of users who can submit content to minimize the attack surface. 8) Conduct regular security assessments and penetration tests focused on web application vulnerabilities including XSS. These steps go beyond generic advice by emphasizing proactive content monitoring, CSP deployment, and privilege management specific to AEM environments.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
adobe
Date Reserved
2025-04-30T20:47:54.965Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6848b1953cd93dcca8311ea0

Added to database: 6/10/2025, 10:28:37 PM

Last enriched: 7/11/2025, 3:05:14 PM

Last updated: 8/4/2025, 10:35:04 AM

Views: 14

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats