Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-64544: Cross-site Scripting (DOM-based XSS) (CWE-79) in Adobe Adobe Experience Manager

0
Medium
VulnerabilityCVE-2025-64544cvecve-2025-64544cwe-79
Published: Wed Dec 10 2025 (12/10/2025, 18:23:43 UTC)
Source: CVE Database V5
Vendor/Project: Adobe
Product: Adobe Experience Manager

Description

Adobe Experience Manager versions 6.5.23 and earlier are affected by a DOM-based Cross-Site Scripting (XSS) vulnerability that could be exploited by a low privileged attacker to execute malicious scripts in the context of the victim's browser. Exploitation of this issue requires user interaction, such as visiting a crafted URL or interacting with a manipulated web page.

AI-Powered Analysis

AILast updated: 12/10/2025, 19:06:01 UTC

Technical Analysis

CVE-2025-64544 is a DOM-based Cross-Site Scripting (XSS) vulnerability identified in Adobe Experience Manager (AEM) versions 6.5.23 and earlier. This vulnerability arises from improper handling of user-controllable input within the Document Object Model (DOM) in the AEM web interface, allowing an attacker with low privileges to inject malicious JavaScript code. The attack vector requires the victim to interact with a crafted URL or manipulated web page, which then executes the malicious script in the victim’s browser context. This can lead to unauthorized actions such as session hijacking, theft of cookies or credentials, and unauthorized access to sensitive information displayed by the web application. The vulnerability is classified under CWE-79, indicating a classic XSS flaw. The CVSS 3.1 base score is 5.4, with vector metrics indicating network attack vector (AV:N), low attack complexity (AC:L), low privileges required (PR:L), user interaction required (UI:R), and a scope change (S:C) affecting confidentiality and integrity but not availability. No patches are currently linked, and no known exploits have been reported in the wild, suggesting the vulnerability is newly disclosed. Adobe Experience Manager is widely used by enterprises for managing digital content and customer experiences, making this vulnerability relevant for organizations relying on AEM for their web presence. Attackers exploiting this vulnerability could leverage it to perform targeted phishing or social engineering attacks to compromise user sessions or steal sensitive data. The vulnerability does not allow direct server compromise but poses a significant risk to end-user security and data confidentiality.

Potential Impact

For European organizations, the impact of CVE-2025-64544 centers on the potential compromise of user sessions and leakage of sensitive information through malicious script execution in browsers. Organizations using Adobe Experience Manager for public-facing websites or intranet portals may see attackers exploit this vulnerability to conduct phishing campaigns, steal authentication tokens, or manipulate displayed content to mislead users. This could lead to reputational damage, regulatory non-compliance (e.g., GDPR breaches if personal data is exposed), and potential financial losses from fraud or unauthorized transactions. Since the vulnerability requires user interaction, the risk is somewhat mitigated by user awareness but remains significant in sectors with high web traffic or sensitive data exposure such as finance, healthcare, and government services. The medium CVSS score reflects moderate risk, but the scope of affected systems is broad given AEM’s market penetration in Europe. The lack of known exploits currently reduces immediate threat but does not eliminate future risk, especially as attackers often weaponize such vulnerabilities post-disclosure. The integrity and confidentiality of user data are the primary concerns, while availability is not impacted.

Mitigation Recommendations

1. Monitor Adobe’s official security advisories and apply patches or updates for Adobe Experience Manager as soon as they become available to address CVE-2025-64544. 2. Implement strict input validation and output encoding in any custom AEM components or client-side scripts to prevent injection of malicious code into the DOM. 3. Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts and reduce the impact of XSS attacks. 4. Conduct regular security audits and penetration testing focused on client-side vulnerabilities in AEM deployments. 5. Educate end-users and administrators about the risks of interacting with suspicious URLs or links, emphasizing phishing awareness. 6. Use web application firewalls (WAF) with rules tailored to detect and block XSS attack patterns targeting AEM. 7. Review and minimize the privileges assigned to users within AEM to limit the potential attack surface. 8. Log and monitor unusual user activities or error messages that might indicate exploitation attempts. These steps go beyond generic advice by focusing on proactive patch management, secure coding practices specific to AEM customizations, and layered defenses including CSP and WAF tailored to the environment.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
adobe
Date Reserved
2025-11-05T22:51:33.020Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6939bda4fe7b3954b690adee

Added to database: 12/10/2025, 6:36:20 PM

Last enriched: 12/10/2025, 7:06:01 PM

Last updated: 12/11/2025, 6:55:24 AM

Views: 2

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats