Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-64539: Cross-site Scripting (DOM-based XSS) (CWE-79) in Adobe Adobe Experience Manager

0
Critical
VulnerabilityCVE-2025-64539cvecve-2025-64539cwe-79
Published: Wed Dec 10 2025 (12/10/2025, 18:24:14 UTC)
Source: CVE Database V5
Vendor/Project: Adobe
Product: Adobe Experience Manager

Description

Adobe Experience Manager versions 6.5.23 and earlier are affected by a DOM-based Cross-Site Scripting (XSS) vulnerability that could lead to arbitrary code execution. An attacker could exploit this vulnerability by injecting malicious scripts into a web page that are executed in the context of the victim's browser. A successful attacker can abuse this to achieve session takeover, increasing the confidentiality and integrity impact as high. Exploitation of this issue requires user interaction in that a victim must visit a crafted malicious page.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 06:53:22 UTC

Technical Analysis

CVE-2025-64539 is a DOM-based Cross-Site Scripting (XSS) vulnerability classified under CWE-79, affecting Adobe Experience Manager (AEM) versions 6.5.23 and earlier. This vulnerability arises from improper handling of untrusted data in the client-side DOM environment, allowing attackers to inject malicious JavaScript code into web pages served by AEM. When a victim user visits a maliciously crafted page or link, the injected script executes within their browser context, enabling the attacker to hijack user sessions, steal sensitive information, or perform actions on behalf of the user. The vulnerability does not require any privileges or authentication to exploit but does require user interaction, specifically visiting a malicious URL. The CVSS v3.1 base score of 9.3 indicates a critical severity, with attack vector being network-based (AV:N), low attack complexity (AC:L), no privileges required (PR:N), user interaction required (UI:R), scope changed (S:C), and high impact on confidentiality (C:H) and integrity (I:H), but no impact on availability (A:N). Adobe Experience Manager is widely used by enterprises for managing digital content and customer experiences, making this vulnerability particularly dangerous as it can lead to session hijacking and unauthorized actions within affected web applications. No patches or exploit code are currently publicly available, but the vulnerability is published and should be considered urgent for remediation.

Potential Impact

The impact of CVE-2025-64539 is significant for organizations using Adobe Experience Manager, particularly those managing sensitive customer data or critical business processes through their web portals. Successful exploitation can lead to session hijacking, allowing attackers to impersonate legitimate users, access confidential information, and manipulate data or application behavior. This compromises both confidentiality and integrity of the affected systems. Although availability is not directly impacted, the loss of trust and potential data breaches can have severe reputational and financial consequences. Enterprises relying on AEM for digital marketing, e-commerce, or customer engagement platforms are at risk of targeted attacks, especially if users are tricked into visiting malicious links. The requirement for user interaction limits automated exploitation but does not reduce the threat in phishing or social engineering scenarios. The vulnerability could also be leveraged as a foothold for further attacks within an organization's network.

Mitigation Recommendations

Organizations should immediately assess their Adobe Experience Manager deployments to identify affected versions (6.5.23 and earlier). Since no patch links are provided yet, temporary mitigations include implementing strict Content Security Policy (CSP) headers to restrict script execution, sanitizing and validating all user inputs and URL parameters on the client side, and employing web application firewalls (WAFs) with rules designed to detect and block DOM-based XSS payloads. Additionally, educating users to avoid clicking on suspicious links can reduce the risk of exploitation. Monitoring web traffic and logs for unusual script injections or user behavior indicative of session hijacking attempts is recommended. Once Adobe releases an official patch, organizations should prioritize timely deployment. Regular security assessments and penetration testing focused on client-side vulnerabilities will help detect similar issues proactively.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
adobe
Date Reserved
2025-11-05T22:51:33.020Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6939bda4fe7b3954b690ade5

Added to database: 12/10/2025, 6:36:20 PM

Last enriched: 2/27/2026, 6:53:22 AM

Last updated: 3/26/2026, 10:25:16 AM

Views: 124

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses