Skip to main content

CVE-2025-46933: Cross-site Scripting (Stored XSS) (CWE-79) in Adobe Adobe Experience Manager

Medium
VulnerabilityCVE-2025-46933cvecve-2025-46933cwe-79
Published: Tue Jun 10 2025 (06/10/2025, 22:17:59 UTC)
Source: CVE Database V5
Vendor/Project: Adobe
Product: Adobe Experience Manager

Description

Adobe Experience Manager versions 6.5.22 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field.

AI-Powered Analysis

AILast updated: 07/11/2025, 14:49:20 UTC

Technical Analysis

CVE-2025-46933 is a stored Cross-Site Scripting (XSS) vulnerability affecting Adobe Experience Manager (AEM) versions 6.5.22 and earlier. This vulnerability arises from insufficient input sanitization in certain form fields within AEM, allowing a low-privileged attacker to inject malicious JavaScript code that is persistently stored on the affected server. When a victim user accesses the compromised page containing the injected script, the malicious code executes in their browser context. The vulnerability is classified under CWE-79, indicating improper neutralization of input during web page generation. The CVSS v3.1 base score is 5.4 (medium severity), with the vector AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N, meaning the attack can be launched remotely over the network with low attack complexity, requires low privileges, and user interaction is needed (the victim must visit the malicious page). The vulnerability impacts confidentiality and integrity by allowing script execution that could steal session tokens, perform actions on behalf of the user, or manipulate displayed content. Availability is not impacted. The scope is changed (S:C), indicating that the vulnerability affects components beyond the initially vulnerable component. No known exploits are currently reported in the wild, and no official patches have been linked yet. Adobe Experience Manager is widely used by enterprises for content management and digital experience delivery, making this vulnerability significant for organizations relying on AEM for their web presence and internal portals.

Potential Impact

For European organizations, the impact of this vulnerability could be substantial, especially for those using Adobe Experience Manager to manage customer-facing websites, intranets, or portals. Successful exploitation could lead to session hijacking, unauthorized actions performed in the context of legitimate users, theft of sensitive data, or defacement of web content. This could result in reputational damage, regulatory non-compliance (e.g., GDPR violations if personal data is exposed), and financial losses. Since the vulnerability requires low privileges but user interaction, phishing or social engineering could be used to lure users to maliciously crafted pages. The medium CVSS score reflects moderate risk, but the widespread use of AEM in sectors such as finance, government, and retail across Europe elevates the potential impact. Additionally, the cross-site scripting vulnerability could be chained with other attacks to escalate privileges or move laterally within networks.

Mitigation Recommendations

European organizations should immediately assess their use of Adobe Experience Manager and identify if they run affected versions (6.5.22 or earlier). Until an official patch is released, organizations should implement the following mitigations: 1) Apply strict Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts and reduce the impact of XSS attacks. 2) Conduct a thorough review and sanitization of all user inputs in AEM forms, applying server-side validation and encoding outputs to prevent script injection. 3) Restrict access to AEM administrative and content authoring interfaces to trusted users and networks only, minimizing the risk of low-privileged attackers injecting malicious content. 4) Educate users about phishing risks and encourage vigilance before clicking on links or interacting with unfamiliar content. 5) Monitor web application logs and user activity for signs of suspicious behavior or injection attempts. 6) Prepare for rapid deployment of official patches once Adobe releases them, including testing in staging environments to ensure compatibility. 7) Consider implementing web application firewalls (WAFs) with rules targeting common XSS attack patterns to provide an additional protective layer.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
adobe
Date Reserved
2025-04-30T20:47:54.969Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6848b1963cd93dcca8311ec5

Added to database: 6/10/2025, 10:28:38 PM

Last enriched: 7/11/2025, 2:49:20 PM

Last updated: 7/30/2025, 4:16:08 PM

Views: 14

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats