Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-64537: Cross-site Scripting (DOM-based XSS) (CWE-79) in Adobe Adobe Experience Manager

0
Critical
VulnerabilityCVE-2025-64537cvecve-2025-64537cwe-79
Published: Wed Dec 10 2025 (12/10/2025, 18:24:20 UTC)
Source: CVE Database V5
Vendor/Project: Adobe
Product: Adobe Experience Manager

Description

Adobe Experience Manager versions 6.5.23 and earlier are affected by a DOM-based Cross-Site Scripting (XSS) vulnerability that could lead to arbitrary code execution. An attacker could exploit this vulnerability by injecting malicious scripts into a web page that are executed in the context of the victim's browser. A successful attacker can abuse this to achieve session takeover, increasing the confidentiality and integrity impact as high. Exploitation of this issue requires user interaction in that a victim must visit a crafted malicious page.

AI-Powered Analysis

AILast updated: 12/10/2025, 18:51:38 UTC

Technical Analysis

CVE-2025-64537 is a DOM-based Cross-Site Scripting (XSS) vulnerability identified in Adobe Experience Manager (AEM) versions 6.5.23 and earlier. The vulnerability arises from improper handling of user-controllable input within the Document Object Model (DOM), allowing attackers to inject malicious JavaScript code that executes in the context of a victim's browser. This type of XSS does not rely on server-side injection but manipulates client-side scripts, making detection and mitigation more challenging. Successful exploitation enables attackers to hijack user sessions, steal sensitive information, or perform actions on behalf of the victim, severely compromising confidentiality and integrity. The vulnerability has a CVSS 3.1 base score of 9.3, indicating critical severity, with an attack vector of network (remote), low attack complexity, no privileges required, but requiring user interaction (victim visiting a malicious page). The scope is changed, meaning the vulnerability can affect components beyond the initially vulnerable module. Although no public exploits are currently known, the high severity and widespread use of AEM in enterprise content management make this a significant threat. The lack of available patches at the time of publication necessitates immediate interim mitigations to reduce risk.

Potential Impact

For European organizations, the impact of CVE-2025-64537 is substantial due to the widespread use of Adobe Experience Manager in managing digital content and customer-facing websites. Exploitation can lead to session hijacking, unauthorized access to sensitive data, and potential manipulation of web content, undermining user trust and regulatory compliance, especially under GDPR. The confidentiality and integrity of user data and corporate information are at high risk, potentially leading to data breaches and reputational damage. Public sector entities, financial institutions, and large enterprises relying on AEM for critical web services are particularly vulnerable. The requirement for user interaction means phishing or social engineering campaigns could be used to lure victims, increasing the attack surface. The absence of known exploits currently provides a window for proactive defense, but the critical severity score demands urgent attention to prevent exploitation in the European digital ecosystem.

Mitigation Recommendations

1. Monitor Adobe's official channels closely for the release of security patches addressing CVE-2025-64537 and apply them immediately upon availability. 2. Implement strict Content Security Policies (CSP) to restrict the execution of unauthorized scripts and reduce the risk of XSS exploitation. 3. Conduct thorough input validation and sanitization on all user-controllable inputs within AEM applications, focusing on DOM manipulation points. 4. Employ web application firewalls (WAFs) with updated rules to detect and block malicious payloads targeting this vulnerability. 5. Educate users and administrators about the risks of phishing and social engineering attacks that could trigger exploitation. 6. Regularly audit and review AEM configurations and custom code for insecure DOM handling practices. 7. Use browser security features such as HTTPOnly and Secure flags on cookies to mitigate session hijacking risks. 8. Implement monitoring and logging to detect anomalous activities indicative of attempted exploitation. 9. Consider isolating or restricting access to vulnerable AEM instances until patches are applied. 10. Engage in threat intelligence sharing with industry peers and cybersecurity communities to stay informed about emerging exploit techniques.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
adobe
Date Reserved
2025-11-05T22:51:33.020Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6939bda4fe7b3954b690addf

Added to database: 12/10/2025, 6:36:20 PM

Last enriched: 12/10/2025, 6:51:38 PM

Last updated: 12/11/2025, 4:17:58 AM

Views: 9

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats