CVE-2025-47078: Cross-site Scripting (Stored XSS) (CWE-79) in Adobe Adobe Experience Manager
Adobe Experience Manager versions 6.5.22 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field.
AI Analysis
Technical Summary
CVE-2025-47078 is a stored Cross-Site Scripting (XSS) vulnerability affecting Adobe Experience Manager (AEM) versions 6.5.22 and earlier. This vulnerability allows a low-privileged attacker to inject malicious JavaScript code into vulnerable form fields within the AEM interface. When a victim user visits a page containing the compromised form field, the malicious script executes in their browser context. Stored XSS differs from reflected XSS in that the malicious payload is permanently stored on the server (e.g., in a database or content repository) and served to users, increasing the attack's persistence and potential impact. The vulnerability is classified under CWE-79, indicating improper neutralization of input leading to script injection. The CVSS v3.1 base score is 5.4 (medium severity), with vector AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N, meaning the attack can be launched remotely over the network with low attack complexity, requires low privileges, and user interaction is needed to trigger the payload. The vulnerability impacts confidentiality and integrity by enabling script execution that could steal session tokens, perform actions on behalf of users, or manipulate displayed content. Availability is not affected. No known exploits are currently reported in the wild, and no official patches or mitigation links are provided yet. Given the widespread use of Adobe Experience Manager in enterprise content management and digital experience platforms, this vulnerability poses a significant risk if exploited, especially in environments where users have elevated privileges or access sensitive information through AEM portals.
Potential Impact
For European organizations, the impact of this vulnerability can be substantial. Many enterprises, government agencies, and service providers in Europe use Adobe Experience Manager to manage websites, intranets, and digital content delivery. Exploitation could lead to session hijacking, unauthorized actions performed in the context of legitimate users, and potential data leakage. This is particularly critical for sectors handling sensitive personal data under GDPR, such as finance, healthcare, and public administration. Compromise of AEM portals could also damage organizational reputation and trust. Since the vulnerability requires user interaction, phishing or social engineering campaigns could be used to lure users to maliciously crafted pages. The cross-site scripting could be leveraged as a foothold for further attacks within the internal network or to spread malware. The medium severity score reflects that while the vulnerability is not trivially exploitable without user interaction, the potential confidentiality and integrity impacts are meaningful in the European regulatory and threat landscape.
Mitigation Recommendations
European organizations should implement the following specific mitigations: 1) Immediately audit all AEM instances to identify versions 6.5.22 or earlier and prioritize their upgrade to the latest patched version once available. 2) Until patches are released, apply strict input validation and output encoding on all form fields within AEM to prevent script injection. 3) Employ Content Security Policy (CSP) headers to restrict execution of unauthorized scripts in browsers accessing AEM content. 4) Conduct user awareness training to reduce the risk of social engineering attacks that could trigger the XSS payload. 5) Monitor web application logs and user behavior for signs of anomalous activity or injection attempts. 6) Use web application firewalls (WAFs) with custom rules to detect and block typical XSS attack patterns targeting AEM. 7) Limit user privileges in AEM to the minimum necessary, reducing the risk posed by low-privileged attackers. 8) Regularly review and sanitize stored content and form inputs to remove any injected scripts. These targeted measures go beyond generic advice by focusing on the specific context and attack vectors of this vulnerability in Adobe Experience Manager.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden, Belgium
CVE-2025-47078: Cross-site Scripting (Stored XSS) (CWE-79) in Adobe Adobe Experience Manager
Description
Adobe Experience Manager versions 6.5.22 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field.
AI-Powered Analysis
Technical Analysis
CVE-2025-47078 is a stored Cross-Site Scripting (XSS) vulnerability affecting Adobe Experience Manager (AEM) versions 6.5.22 and earlier. This vulnerability allows a low-privileged attacker to inject malicious JavaScript code into vulnerable form fields within the AEM interface. When a victim user visits a page containing the compromised form field, the malicious script executes in their browser context. Stored XSS differs from reflected XSS in that the malicious payload is permanently stored on the server (e.g., in a database or content repository) and served to users, increasing the attack's persistence and potential impact. The vulnerability is classified under CWE-79, indicating improper neutralization of input leading to script injection. The CVSS v3.1 base score is 5.4 (medium severity), with vector AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N, meaning the attack can be launched remotely over the network with low attack complexity, requires low privileges, and user interaction is needed to trigger the payload. The vulnerability impacts confidentiality and integrity by enabling script execution that could steal session tokens, perform actions on behalf of users, or manipulate displayed content. Availability is not affected. No known exploits are currently reported in the wild, and no official patches or mitigation links are provided yet. Given the widespread use of Adobe Experience Manager in enterprise content management and digital experience platforms, this vulnerability poses a significant risk if exploited, especially in environments where users have elevated privileges or access sensitive information through AEM portals.
Potential Impact
For European organizations, the impact of this vulnerability can be substantial. Many enterprises, government agencies, and service providers in Europe use Adobe Experience Manager to manage websites, intranets, and digital content delivery. Exploitation could lead to session hijacking, unauthorized actions performed in the context of legitimate users, and potential data leakage. This is particularly critical for sectors handling sensitive personal data under GDPR, such as finance, healthcare, and public administration. Compromise of AEM portals could also damage organizational reputation and trust. Since the vulnerability requires user interaction, phishing or social engineering campaigns could be used to lure users to maliciously crafted pages. The cross-site scripting could be leveraged as a foothold for further attacks within the internal network or to spread malware. The medium severity score reflects that while the vulnerability is not trivially exploitable without user interaction, the potential confidentiality and integrity impacts are meaningful in the European regulatory and threat landscape.
Mitigation Recommendations
European organizations should implement the following specific mitigations: 1) Immediately audit all AEM instances to identify versions 6.5.22 or earlier and prioritize their upgrade to the latest patched version once available. 2) Until patches are released, apply strict input validation and output encoding on all form fields within AEM to prevent script injection. 3) Employ Content Security Policy (CSP) headers to restrict execution of unauthorized scripts in browsers accessing AEM content. 4) Conduct user awareness training to reduce the risk of social engineering attacks that could trigger the XSS payload. 5) Monitor web application logs and user behavior for signs of anomalous activity or injection attempts. 6) Use web application firewalls (WAFs) with custom rules to detect and block typical XSS attack patterns targeting AEM. 7) Limit user privileges in AEM to the minimum necessary, reducing the risk posed by low-privileged attackers. 8) Regularly review and sanitize stored content and form inputs to remove any injected scripts. These targeted measures go beyond generic advice by focusing on the specific context and attack vectors of this vulnerability in Adobe Experience Manager.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- adobe
- Date Reserved
- 2025-04-30T20:47:54.999Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6848b19b3cd93dcca831209f
Added to database: 6/10/2025, 10:28:43 PM
Last enriched: 7/11/2025, 6:35:22 AM
Last updated: 8/7/2025, 6:43:47 AM
Views: 16
Related Threats
CVE-2025-8982: SQL Injection in itsourcecode Online Tour and Travel Management System
MediumCVE-2025-8981: SQL Injection in itsourcecode Online Tour and Travel Management System
MediumCVE-2025-50862: n/a
MediumCVE-2025-50861: n/a
HighCVE-2025-8978: Insufficient Verification of Data Authenticity in D-Link DIR-619L
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.