Skip to main content

CVE-2025-47057: Cross-site Scripting (DOM-based XSS) (CWE-79) in Adobe Adobe Experience Manager

Medium
VulnerabilityCVE-2025-47057cvecve-2025-47057cwe-79
Published: Tue Jun 10 2025 (06/10/2025, 22:20:01 UTC)
Source: CVE Database V5
Vendor/Project: Adobe
Product: Adobe Experience Manager

Description

Adobe Experience Manager versions 6.5.22 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field.

AI-Powered Analysis

AILast updated: 07/11/2025, 08:01:12 UTC

Technical Analysis

CVE-2025-47057 is a stored Cross-Site Scripting (XSS) vulnerability affecting Adobe Experience Manager (AEM) versions 6.5.22 and earlier. This vulnerability arises from insufficient input sanitization in certain form fields within AEM, allowing a low-privileged attacker to inject malicious JavaScript code that is persistently stored on the server. When a victim user accesses a page containing the compromised form field, the malicious script executes in their browser context. This DOM-based XSS attack can lead to unauthorized actions such as session hijacking, credential theft, or unauthorized manipulation of the web application interface. The vulnerability requires the attacker to have low privileges but does require user interaction, as the victim must visit the affected page for the script to execute. The CVSS 3.1 base score is 5.4 (medium severity), reflecting the network attack vector, low attack complexity, low privileges required, but requiring user interaction. The scope is changed (S:C), indicating that exploitation can affect resources beyond the vulnerable component. No known exploits are currently reported in the wild, and no patches have been linked yet, indicating that organizations using vulnerable AEM versions remain at risk until remediation is applied.

Potential Impact

For European organizations using Adobe Experience Manager, this vulnerability poses a significant risk to the confidentiality and integrity of web applications and their users. A successful exploit could lead to session hijacking, enabling attackers to impersonate legitimate users, potentially including administrators or privileged users. This can result in unauthorized access to sensitive corporate data, manipulation of content, or further compromise of internal systems. Given AEM's widespread use in enterprise content management across Europe, especially in sectors such as government, finance, and media, exploitation could disrupt business operations and damage organizational reputation. The vulnerability's requirement for user interaction means phishing or social engineering could be leveraged to increase attack success. Although availability impact is low, the breach of confidentiality and integrity can have cascading effects, including regulatory non-compliance under GDPR due to data exposure or unauthorized data modification.

Mitigation Recommendations

European organizations should prioritize upgrading Adobe Experience Manager to the latest version once Adobe releases a patch addressing CVE-2025-47057. In the interim, organizations can implement strict input validation and output encoding on all user-supplied data within AEM forms to mitigate injection risks. Employing Content Security Policy (CSP) headers can restrict the execution of unauthorized scripts in browsers, reducing the impact of XSS attacks. Regularly audit and monitor web application logs for unusual activity or injection attempts. User awareness training should emphasize caution when clicking on links or visiting unfamiliar pages within corporate web applications. Additionally, deploying Web Application Firewalls (WAFs) with custom rules to detect and block malicious payloads targeting known vulnerable form fields can provide a protective layer. Finally, segmenting AEM environments and limiting user privileges can reduce the attack surface and potential damage from exploitation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
adobe
Date Reserved
2025-04-30T20:47:54.998Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6848b19b3cd93dcca8312058

Added to database: 6/10/2025, 10:28:43 PM

Last enriched: 7/11/2025, 8:01:12 AM

Last updated: 8/6/2025, 3:14:02 PM

Views: 22

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats