Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-61797: Cross-site Scripting (Stored XSS) (CWE-79) in Adobe Adobe Experience Manager

0
Medium
VulnerabilityCVE-2025-61797cvecve-2025-61797cwe-79
Published: Tue Oct 14 2025 (10/14/2025, 21:18:13 UTC)
Source: CVE Database V5
Vendor/Project: Adobe
Product: Adobe Experience Manager

Description

Adobe Experience Manager versions 11.6 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field. Exploitation of this issue requires user interaction in that a victim must open a malicious link. Scope is changed.

AI-Powered Analysis

AILast updated: 10/14/2025, 21:41:33 UTC

Technical Analysis

CVE-2025-61797 is a stored Cross-Site Scripting (XSS) vulnerability classified under CWE-79, affecting Adobe Experience Manager (AEM) versions 11.6 and earlier. The vulnerability allows a low-privileged attacker to inject malicious JavaScript code into form fields that are not properly sanitized or escaped. When a victim user visits a page containing the injected script, the malicious code executes in their browser context, potentially leading to theft of session cookies, user credentials, or other sensitive information accessible via the browser. The attack requires the victim to interact with a crafted malicious link, indicating user interaction is necessary for exploitation. The vulnerability changes the security scope, meaning the impact can extend beyond the attacker’s privileges. The CVSS 3.1 base score is 5.4, reflecting medium severity with vector AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N, indicating network attack vector, low attack complexity, low privileges required, user interaction required, scope changed, and limited confidentiality and integrity impact without availability impact. No patches or known exploits are currently reported, but the vulnerability poses a risk to organizations relying on AEM for web content management, especially those exposing user input forms. Attackers could leverage this vulnerability to perform targeted attacks such as session hijacking or delivering further malware payloads via the victim’s browser.

Potential Impact

For European organizations, the impact of CVE-2025-61797 can be significant, especially for those using Adobe Experience Manager to manage public-facing websites or intranet portals. Exploitation could lead to unauthorized access to user sessions, theft of sensitive data, or manipulation of web content integrity. This can damage organizational reputation, lead to data breaches involving personal data protected under GDPR, and disrupt business operations reliant on trusted digital experiences. Since the vulnerability requires user interaction, phishing or social engineering campaigns could be used to increase exploitation success. The medium severity score reflects moderate risk, but the scope change and potential for lateral impact within affected systems elevate the concern. Organizations in sectors such as finance, government, healthcare, and media, which often use AEM for digital content delivery, are particularly vulnerable. Failure to address this vulnerability could result in regulatory penalties and loss of customer trust.

Mitigation Recommendations

To mitigate CVE-2025-61797, organizations should prioritize updating Adobe Experience Manager to a version where this vulnerability is patched once available. In the absence of an immediate patch, implement strict input validation and output encoding on all user-supplied data in form fields to prevent script injection. Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in browsers. Conduct regular security audits and penetration testing focusing on XSS vulnerabilities in AEM deployments. Educate users about the risks of clicking on suspicious links to reduce successful exploitation via social engineering. Monitor web server and application logs for unusual input patterns or error messages indicating attempted exploitation. Consider deploying Web Application Firewalls (WAF) with rules tuned to detect and block XSS payloads targeting AEM. Finally, segment and restrict access to AEM administrative interfaces to minimize the impact of compromised low-privileged accounts.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
adobe
Date Reserved
2025-10-01T17:52:06.975Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68eec00f519df59857dc719b

Added to database: 10/14/2025, 9:26:39 PM

Last enriched: 10/14/2025, 9:41:33 PM

Last updated: 10/15/2025, 1:57:41 AM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats