Skip to main content

CVE-2025-47074: Cross-site Scripting (Stored XSS) (CWE-79) in Adobe Adobe Experience Manager

Medium
VulnerabilityCVE-2025-47074cvecve-2025-47074cwe-79
Published: Tue Jun 10 2025 (06/10/2025, 22:19:54 UTC)
Source: CVE Database V5
Vendor/Project: Adobe
Product: Adobe Experience Manager

Description

Adobe Experience Manager versions 6.5.22 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field.

AI-Powered Analysis

AILast updated: 07/11/2025, 06:48:00 UTC

Technical Analysis

CVE-2025-47074 is a stored Cross-Site Scripting (XSS) vulnerability affecting Adobe Experience Manager (AEM) versions 6.5.22 and earlier. This vulnerability arises from insufficient input sanitization in certain form fields within the AEM platform, allowing a low-privileged attacker to inject malicious JavaScript code that is persistently stored on the server. When a victim user accesses a page containing the compromised form field, the malicious script executes in their browser context. This can lead to a range of attacks including session hijacking, credential theft, unauthorized actions on behalf of the user, or further malware delivery. The vulnerability is classified under CWE-79 (Improper Neutralization of Input During Web Page Generation), which is a common web application security issue. The CVSS v3.1 base score is 5.4 (medium severity), reflecting that the attack vector is network-based, requires low privileges, and user interaction is needed to trigger the exploit. The scope is changed (S:C), meaning the vulnerability can affect components beyond the initially vulnerable component. Confidentiality and integrity impacts are low, while availability is not affected. No known public exploits have been reported yet, and no patches have been linked at the time of publication. Given the widespread use of Adobe Experience Manager in enterprise content management and web experience delivery, this vulnerability poses a significant risk if exploited, especially in environments where users have elevated privileges or access sensitive data through the affected web interfaces.

Potential Impact

For European organizations, the impact of CVE-2025-47074 can be substantial, particularly for those relying on Adobe Experience Manager to deliver web content, manage digital assets, or provide customer-facing portals. Exploitation could lead to unauthorized script execution in users’ browsers, potentially compromising user sessions, leaking sensitive information, or enabling further attacks such as phishing or malware distribution. This is especially critical for sectors like finance, healthcare, government, and e-commerce, where trust and data integrity are paramount. Additionally, given the GDPR and other stringent data protection regulations in Europe, any compromise resulting in personal data exposure could lead to regulatory penalties and reputational damage. The medium severity rating suggests that while the vulnerability is not trivially exploitable without user interaction, the low privilege requirement means attackers could leverage compromised or low-level accounts to inject malicious payloads. Organizations with large user bases or public-facing AEM deployments are at higher risk of widespread impact.

Mitigation Recommendations

To mitigate this vulnerability effectively, European organizations should: 1) Immediately audit their Adobe Experience Manager instances to identify affected versions (6.5.22 and earlier) and prioritize upgrades to patched versions once available. 2) Implement strict input validation and output encoding on all user-supplied data in AEM forms to prevent script injection, even before official patches are released. 3) Employ Web Application Firewalls (WAFs) with custom rules to detect and block suspicious script injection attempts targeting AEM form fields. 4) Conduct thorough security testing and code reviews of custom AEM components or extensions that handle user input. 5) Educate users and administrators about the risks of clicking on suspicious links or interacting with untrusted content within AEM-powered sites. 6) Monitor logs and user activity for unusual behavior indicative of XSS exploitation attempts. 7) Restrict privileges for users who can submit data to vulnerable forms to minimize the attack surface. 8) Prepare incident response plans specifically addressing XSS attacks to enable rapid containment and remediation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
adobe
Date Reserved
2025-04-30T20:47:54.999Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6848b19b3cd93dcca8312089

Added to database: 6/10/2025, 10:28:43 PM

Last enriched: 7/11/2025, 6:48:00 AM

Last updated: 8/8/2025, 4:27:36 AM

Views: 20

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats