Skip to main content

CVE-2025-49547: Cross-site Scripting (Stored XSS) (CWE-79) in Adobe Adobe Experience Manager

Medium
VulnerabilityCVE-2025-49547cvecve-2025-49547cwe-79
Published: Tue Jul 08 2025 (07/08/2025, 21:40:36 UTC)
Source: CVE Database V5
Vendor/Project: Adobe
Product: Adobe Experience Manager

Description

Adobe Experience Manager versions 11.4 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low-privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field. Scope is changed.

AI-Powered Analysis

AILast updated: 07/08/2025, 22:11:27 UTC

Technical Analysis

CVE-2025-49547 is a stored Cross-Site Scripting (XSS) vulnerability affecting Adobe Experience Manager (AEM) versions 11.4 and earlier. This vulnerability allows a low-privileged attacker to inject malicious JavaScript code into vulnerable form fields within the AEM interface. When a victim, such as an administrator or content editor, visits a page containing the injected malicious script, the script executes in their browser context. This can lead to unauthorized actions such as session hijacking, credential theft, or unauthorized modification of content. The vulnerability is classified as CWE-79, indicating improper neutralization of input during web page generation. The CVSS v3.1 base score is 5.4 (medium severity), reflecting that the attack vector is network-based (AV:N), requires low privileges (PR:L), and user interaction (UI:R) is necessary for exploitation. The scope is changed (S:C), meaning the vulnerability affects resources beyond the initially vulnerable component, potentially impacting other components or users. No known exploits are reported in the wild yet, and no patches have been linked at the time of publication. The vulnerability’s impact primarily concerns confidentiality and integrity, with no direct availability impact. Stored XSS in a widely used enterprise content management system like AEM can be leveraged for persistent attacks, making it a significant concern for organizations relying on AEM for web content delivery and management.

Potential Impact

For European organizations using Adobe Experience Manager, this vulnerability poses risks to the confidentiality and integrity of their web content and user sessions. Attackers exploiting this flaw could execute malicious scripts in the browsers of administrators or content managers, potentially leading to theft of authentication tokens, unauthorized content changes, or the spread of malware to site visitors. Since AEM is often used by government agencies, large enterprises, and media companies in Europe, exploitation could lead to reputational damage, data breaches involving sensitive information, and disruption of digital services. The medium CVSS score indicates moderate risk; however, the changed scope and stored nature of the XSS increase the potential impact because the malicious script persists and affects multiple users. European organizations with public-facing AEM instances are particularly at risk, as attackers can target users who access these web portals. Additionally, compliance with GDPR and other data protection regulations means that exploitation leading to data leakage could result in regulatory penalties.

Mitigation Recommendations

1. Immediate mitigation should include reviewing and sanitizing all user inputs in AEM form fields to prevent injection of malicious scripts. 2. Implement Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in browsers accessing AEM-managed sites. 3. Restrict privileges for users who can submit content to only those necessary, minimizing the risk from low-privileged attackers. 4. Monitor and audit AEM logs for unusual input patterns or script injections. 5. Apply any available Adobe patches or updates as soon as they are released. 6. Use web application firewalls (WAF) with rules targeting XSS payloads specific to AEM. 7. Educate administrators and content editors about the risks of clicking on suspicious links or content within the AEM environment. 8. Conduct regular security assessments and penetration testing focused on input validation and XSS vulnerabilities within AEM deployments. These steps go beyond generic advice by focusing on privilege management, CSP implementation, and proactive monitoring tailored to AEM’s architecture.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
adobe
Date Reserved
2025-06-06T15:42:09.516Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 686d93976f40f0eb72fbc81c

Added to database: 7/8/2025, 9:54:31 PM

Last enriched: 7/8/2025, 10:11:27 PM

Last updated: 8/15/2025, 11:51:37 AM

Views: 18

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats