CVE-2025-47074: Cross-site Scripting (Stored XSS) (CWE-79) in Adobe Adobe Experience Manager
Adobe Experience Manager versions 6.5.22 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field.
AI Analysis
Technical Summary
CVE-2025-47074 is a stored Cross-Site Scripting (XSS) vulnerability affecting Adobe Experience Manager (AEM) versions 6.5.22 and earlier. This vulnerability arises from insufficient input sanitization in certain form fields within the AEM platform, allowing a low-privileged attacker to inject malicious JavaScript code that is persistently stored on the server. When a victim user accesses a page containing the compromised form field, the malicious script executes in their browser context. This can lead to a range of attacks including session hijacking, credential theft, unauthorized actions on behalf of the user, or further malware delivery. The vulnerability is classified under CWE-79 (Improper Neutralization of Input During Web Page Generation), which is a common web application security issue. The CVSS v3.1 base score is 5.4 (medium severity), reflecting that the attack vector is network-based, requires low privileges, and user interaction is needed to trigger the exploit. The scope is changed (S:C), meaning the vulnerability can affect components beyond the initially vulnerable component. Confidentiality and integrity impacts are low, while availability is not affected. No known public exploits have been reported yet, and no patches have been linked at the time of publication. Given the widespread use of Adobe Experience Manager in enterprise content management and web experience delivery, this vulnerability poses a significant risk if exploited, especially in environments where users have elevated privileges or access sensitive data through the affected web interfaces.
Potential Impact
For European organizations, the impact of CVE-2025-47074 can be substantial, particularly for those relying on Adobe Experience Manager to deliver web content, manage digital assets, or provide customer-facing portals. Exploitation could lead to unauthorized script execution in users’ browsers, potentially compromising user sessions, leaking sensitive information, or enabling further attacks such as phishing or malware distribution. This is especially critical for sectors like finance, healthcare, government, and e-commerce, where trust and data integrity are paramount. Additionally, given the GDPR and other stringent data protection regulations in Europe, any compromise resulting in personal data exposure could lead to regulatory penalties and reputational damage. The medium severity rating suggests that while the vulnerability is not trivially exploitable without user interaction, the low privilege requirement means attackers could leverage compromised or low-level accounts to inject malicious payloads. Organizations with large user bases or public-facing AEM deployments are at higher risk of widespread impact.
Mitigation Recommendations
To mitigate this vulnerability effectively, European organizations should: 1) Immediately audit their Adobe Experience Manager instances to identify affected versions (6.5.22 and earlier) and prioritize upgrades to patched versions once available. 2) Implement strict input validation and output encoding on all user-supplied data in AEM forms to prevent script injection, even before official patches are released. 3) Employ Web Application Firewalls (WAFs) with custom rules to detect and block suspicious script injection attempts targeting AEM form fields. 4) Conduct thorough security testing and code reviews of custom AEM components or extensions that handle user input. 5) Educate users and administrators about the risks of clicking on suspicious links or interacting with untrusted content within AEM-powered sites. 6) Monitor logs and user activity for unusual behavior indicative of XSS exploitation attempts. 7) Restrict privileges for users who can submit data to vulnerable forms to minimize the attack surface. 8) Prepare incident response plans specifically addressing XSS attacks to enable rapid containment and remediation.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden, Belgium
CVE-2025-47074: Cross-site Scripting (Stored XSS) (CWE-79) in Adobe Adobe Experience Manager
Description
Adobe Experience Manager versions 6.5.22 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field.
AI-Powered Analysis
Technical Analysis
CVE-2025-47074 is a stored Cross-Site Scripting (XSS) vulnerability affecting Adobe Experience Manager (AEM) versions 6.5.22 and earlier. This vulnerability arises from insufficient input sanitization in certain form fields within the AEM platform, allowing a low-privileged attacker to inject malicious JavaScript code that is persistently stored on the server. When a victim user accesses a page containing the compromised form field, the malicious script executes in their browser context. This can lead to a range of attacks including session hijacking, credential theft, unauthorized actions on behalf of the user, or further malware delivery. The vulnerability is classified under CWE-79 (Improper Neutralization of Input During Web Page Generation), which is a common web application security issue. The CVSS v3.1 base score is 5.4 (medium severity), reflecting that the attack vector is network-based, requires low privileges, and user interaction is needed to trigger the exploit. The scope is changed (S:C), meaning the vulnerability can affect components beyond the initially vulnerable component. Confidentiality and integrity impacts are low, while availability is not affected. No known public exploits have been reported yet, and no patches have been linked at the time of publication. Given the widespread use of Adobe Experience Manager in enterprise content management and web experience delivery, this vulnerability poses a significant risk if exploited, especially in environments where users have elevated privileges or access sensitive data through the affected web interfaces.
Potential Impact
For European organizations, the impact of CVE-2025-47074 can be substantial, particularly for those relying on Adobe Experience Manager to deliver web content, manage digital assets, or provide customer-facing portals. Exploitation could lead to unauthorized script execution in users’ browsers, potentially compromising user sessions, leaking sensitive information, or enabling further attacks such as phishing or malware distribution. This is especially critical for sectors like finance, healthcare, government, and e-commerce, where trust and data integrity are paramount. Additionally, given the GDPR and other stringent data protection regulations in Europe, any compromise resulting in personal data exposure could lead to regulatory penalties and reputational damage. The medium severity rating suggests that while the vulnerability is not trivially exploitable without user interaction, the low privilege requirement means attackers could leverage compromised or low-level accounts to inject malicious payloads. Organizations with large user bases or public-facing AEM deployments are at higher risk of widespread impact.
Mitigation Recommendations
To mitigate this vulnerability effectively, European organizations should: 1) Immediately audit their Adobe Experience Manager instances to identify affected versions (6.5.22 and earlier) and prioritize upgrades to patched versions once available. 2) Implement strict input validation and output encoding on all user-supplied data in AEM forms to prevent script injection, even before official patches are released. 3) Employ Web Application Firewalls (WAFs) with custom rules to detect and block suspicious script injection attempts targeting AEM form fields. 4) Conduct thorough security testing and code reviews of custom AEM components or extensions that handle user input. 5) Educate users and administrators about the risks of clicking on suspicious links or interacting with untrusted content within AEM-powered sites. 6) Monitor logs and user activity for unusual behavior indicative of XSS exploitation attempts. 7) Restrict privileges for users who can submit data to vulnerable forms to minimize the attack surface. 8) Prepare incident response plans specifically addressing XSS attacks to enable rapid containment and remediation.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- adobe
- Date Reserved
- 2025-04-30T20:47:54.999Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6848b19b3cd93dcca8312089
Added to database: 6/10/2025, 10:28:43 PM
Last enriched: 7/11/2025, 6:48:00 AM
Last updated: 8/8/2025, 4:27:36 AM
Views: 20
Related Threats
CVE-2025-55164: CWE-1321: Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') in helmetjs content-security-policy-parser
HighCVE-2025-3089: CWE-639 Authorization Bypass Through User-Controlled Key in ServiceNow ServiceNow AI Platform
MediumCVE-2025-54864: CWE-306: Missing Authentication for Critical Function in NixOS hydra
MediumCVE-2025-54800: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in NixOS hydra
HighCVE-2025-8452: CWE-538 Insertion of Sensitive Information into Externally-Accessible File or Directory in Brother Industries, Ltd HL-L8260CDN
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.