Skip to main content

CVE-2025-47044: Cross-site Scripting (DOM-based XSS) (CWE-79) in Adobe Adobe Experience Manager

Medium
VulnerabilityCVE-2025-47044cvecve-2025-47044cwe-79
Published: Tue Jun 10 2025 (06/10/2025, 22:18:46 UTC)
Source: CVE Database V5
Vendor/Project: Adobe
Product: Adobe Experience Manager

Description

Adobe Experience Manager versions 6.5.22 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field.

AI-Powered Analysis

AILast updated: 07/11/2025, 08:34:12 UTC

Technical Analysis

CVE-2025-47044 is a stored Cross-Site Scripting (XSS) vulnerability affecting Adobe Experience Manager (AEM) versions 6.5.22 and earlier. This vulnerability arises from insufficient sanitization of user input in certain form fields, allowing a low-privileged attacker to inject malicious JavaScript code that is persistently stored on the server. When a victim subsequently accesses the affected page containing the vulnerable form field, the malicious script executes in their browser context. This type of DOM-based XSS (CWE-79) can lead to unauthorized actions such as session hijacking, credential theft, or performing actions on behalf of the user without their consent. The vulnerability has a CVSS 3.1 base score of 5.4, indicating a medium severity level. The attack vector is network-based with low attack complexity, requiring low privileges but user interaction (victim browsing the page). The scope is changed, meaning the vulnerability can impact resources beyond the initially vulnerable component. No known exploits are currently reported in the wild, and no patches have been linked yet. Adobe Experience Manager is a widely used enterprise content management system, often deployed in web portals and intranets, making this vulnerability relevant for organizations relying on AEM for digital experience management.

Potential Impact

For European organizations, this vulnerability poses a significant risk to the confidentiality and integrity of user sessions and data handled through Adobe Experience Manager portals. Exploitation could allow attackers to execute arbitrary scripts in the context of authenticated users, potentially leading to theft of sensitive information, unauthorized transactions, or lateral movement within the network if internal portals are affected. Given the widespread adoption of AEM by public sector entities, financial institutions, and large enterprises in Europe, successful exploitation could undermine trust, cause data breaches, and disrupt business operations. The medium CVSS score reflects that while the vulnerability requires some user interaction and low privileges, the impact on confidentiality and integrity is notable. The absence of known exploits in the wild currently reduces immediate risk but does not eliminate the threat, especially as attackers often develop exploits rapidly after disclosure.

Mitigation Recommendations

European organizations using Adobe Experience Manager should prioritize the following mitigations: 1) Monitor Adobe's official channels for patches or security advisories addressing CVE-2025-47044 and apply updates promptly once available. 2) Implement strict input validation and output encoding on all user-supplied data within AEM forms to prevent script injection. 3) Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in browsers accessing AEM portals. 4) Conduct thorough security testing, including automated scanning and manual penetration testing focused on XSS vulnerabilities in AEM deployments. 5) Educate users and administrators about the risks of clicking on suspicious links or interacting with untrusted content within AEM environments. 6) Where feasible, restrict access to AEM administrative and content management interfaces to trusted networks and authenticated users only. 7) Utilize web application firewalls (WAF) with rules tuned to detect and block common XSS attack patterns targeting AEM. These measures, combined, will reduce the likelihood of successful exploitation and limit potential damage.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
adobe
Date Reserved
2025-04-30T20:47:54.997Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6848b19a3cd93dcca8312030

Added to database: 6/10/2025, 10:28:42 PM

Last enriched: 7/11/2025, 8:34:12 AM

Last updated: 7/30/2025, 4:16:34 PM

Views: 17

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats