Skip to main content

CVE-2025-47116: Cross-site Scripting (Stored XSS) (CWE-79) in Adobe Adobe Experience Manager

Medium
VulnerabilityCVE-2025-47116cvecve-2025-47116cwe-79
Published: Tue Jun 10 2025 (06/10/2025, 22:19:14 UTC)
Source: CVE Database V5
Vendor/Project: Adobe
Product: Adobe Experience Manager

Description

Adobe Experience Manager versions 6.5.22 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field.

AI-Powered Analysis

AILast updated: 07/11/2025, 03:31:45 UTC

Technical Analysis

CVE-2025-47116 is a stored Cross-Site Scripting (XSS) vulnerability affecting Adobe Experience Manager (AEM) versions 6.5.22 and earlier. This vulnerability arises from insufficient input sanitization in certain form fields within the AEM platform, allowing a low-privileged attacker to inject malicious JavaScript code that is persistently stored on the server. When a victim user accesses a page containing the compromised form field, the malicious script executes in their browser context. The vulnerability is classified under CWE-79, which covers improper neutralization of input during web page generation. The CVSS v3.1 base score is 5.4 (medium severity), with the vector indicating network attack vector (AV:N), low attack complexity (AC:L), requiring low privileges (PR:L), user interaction required (UI:R), scope changed (S:C), and impacts on confidentiality and integrity (C:L/I:L) but no impact on availability (A:N). The scope change indicates that the vulnerability affects resources beyond the initially vulnerable component, potentially impacting other components or users. Although no known exploits are currently reported in the wild, the presence of stored XSS in a widely used enterprise content management system like AEM poses a significant risk. Attackers could leverage this vulnerability to execute arbitrary scripts in the context of authenticated users, potentially leading to session hijacking, theft of sensitive information, or further exploitation within the victim’s network. The vulnerability requires user interaction, meaning the victim must visit the maliciously crafted page, but the attacker only needs low privileges to inject the payload, increasing the risk in environments with multiple user roles. Adobe has not yet published patches or mitigations at the time of this report, emphasizing the need for immediate attention by administrators.

Potential Impact

For European organizations using Adobe Experience Manager, this vulnerability could lead to unauthorized disclosure of sensitive data, including user credentials, session tokens, or internal information accessible through the victim’s browser session. Given AEM’s role in managing digital content and customer-facing portals, exploitation could damage organizational reputation, lead to compliance violations (e.g., GDPR breaches due to data leakage), and facilitate further attacks such as privilege escalation or lateral movement within corporate networks. The medium severity score reflects moderate impact, but the scope change and low privilege requirement increase the risk in multi-user environments common in European enterprises. Organizations in sectors such as government, finance, healthcare, and media—where AEM is often deployed—may face heightened risks due to the sensitivity of their data and regulatory requirements. Additionally, stored XSS vulnerabilities can be leveraged for persistent attacks, making detection and remediation more challenging. The lack of known exploits currently provides a window for proactive mitigation before active exploitation occurs.

Mitigation Recommendations

1. Immediate mitigation should include disabling or restricting access to vulnerable form fields where possible until patches are available. 2. Implement strict input validation and output encoding on all user-supplied data in AEM forms to prevent script injection. 3. Use Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in browsers accessing AEM portals. 4. Monitor web application logs and user activity for unusual input patterns or repeated form submissions that could indicate exploitation attempts. 5. Educate users to be cautious about clicking on suspicious links or visiting untrusted pages within the AEM environment. 6. Apply the official Adobe patches or updates as soon as they are released. 7. Conduct regular security assessments and penetration testing focusing on XSS and other injection vulnerabilities in AEM deployments. 8. Employ web application firewalls (WAF) with rules tuned to detect and block XSS payloads targeting AEM. 9. Review and minimize user privileges in AEM to reduce the risk of low-privileged attackers injecting malicious content. 10. Keep all related software components and dependencies up to date to reduce the attack surface.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
adobe
Date Reserved
2025-04-30T20:47:55.001Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6848b19c3cd93dcca83120f8

Added to database: 6/10/2025, 10:28:44 PM

Last enriched: 7/11/2025, 3:31:45 AM

Last updated: 7/30/2025, 4:16:43 PM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats