Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-64547: Cross-site Scripting (Stored XSS) (CWE-79) in Adobe Adobe Experience Manager

0
Medium
VulnerabilityCVE-2025-64547cvecve-2025-64547cwe-79
Published: Wed Dec 10 2025 (12/10/2025, 18:24:26 UTC)
Source: CVE Database V5
Vendor/Project: Adobe
Product: Adobe Experience Manager

Description

Adobe Experience Manager versions 6.5.23 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field.

AI-Powered Analysis

AILast updated: 12/10/2025, 19:06:47 UTC

Technical Analysis

CVE-2025-64547 is a stored Cross-Site Scripting (XSS) vulnerability identified in Adobe Experience Manager (AEM), specifically affecting versions 6.5.23 and earlier. Stored XSS occurs when an attacker injects malicious scripts into a web application's persistent storage, such as form fields, which are then served to other users. In this case, a low privileged attacker can exploit vulnerable form fields within AEM to insert malicious JavaScript code. When other users access pages containing these fields, the injected scripts execute in their browsers under the context of the vulnerable site. This can lead to theft of session cookies, user impersonation, or unauthorized actions performed on behalf of the victim. The vulnerability has a CVSS v3.1 base score of 5.4, indicating medium severity. The vector string (AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N) reveals that the attack can be performed remotely over the network with low attack complexity, requires low privileges, and user interaction (visiting the malicious page) is necessary. The scope is changed, meaning the vulnerability can affect resources beyond the initially vulnerable component. Confidentiality and integrity impacts are low, while availability is unaffected. No public exploit code or active exploitation has been reported yet. Adobe has not yet published patches, but the vulnerability is officially documented and reserved since November 2025. This vulnerability is critical for organizations relying on AEM for managing digital content and customer experiences, as it can be leveraged to compromise user trust and data integrity.

Potential Impact

European organizations using Adobe Experience Manager for web content management and digital experience delivery face risks including session hijacking, unauthorized actions, and potential data leakage through this stored XSS vulnerability. Given AEM’s widespread use in sectors such as government, finance, retail, and media across Europe, exploitation could lead to compromised user accounts, defacement of public-facing websites, and erosion of customer trust. The medium severity score reflects moderate risk, but the potential for lateral attacks or chaining with other vulnerabilities could increase impact. Public-facing portals and intranet applications with multiple user roles are particularly vulnerable. The requirement for user interaction (visiting the malicious page) limits automated exploitation but does not eliminate risk, especially in phishing or social engineering scenarios. The absence of known exploits in the wild currently reduces immediate threat but does not preclude future attacks. Organizations may also face regulatory and compliance repercussions under GDPR if user data confidentiality is compromised.

Mitigation Recommendations

1. Monitor Adobe’s official channels for patches addressing CVE-2025-64547 and apply updates promptly once available. 2. Implement strict input validation on all form fields to reject or sanitize potentially malicious script content before storage. 3. Employ comprehensive output encoding (e.g., HTML entity encoding) when rendering user-supplied data to prevent script execution. 4. Deploy Content Security Policy (CSP) headers configured to restrict inline scripts and limit sources of executable scripts, mitigating impact if injection occurs. 5. Conduct regular security assessments and penetration testing focusing on XSS vulnerabilities in AEM deployments. 6. Educate users and administrators about phishing risks and the importance of cautious browsing behavior to reduce successful exploitation via user interaction. 7. Use web application firewalls (WAFs) with updated signatures to detect and block malicious payloads targeting known XSS vectors. 8. Review and minimize user privileges to reduce the likelihood of low privileged attackers injecting malicious content. 9. Log and monitor unusual activities related to form submissions and script execution to detect exploitation attempts early.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
adobe
Date Reserved
2025-11-05T22:51:33.021Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6939bda5fe7b3954b690ae04

Added to database: 12/10/2025, 6:36:21 PM

Last enriched: 12/10/2025, 7:06:47 PM

Last updated: 12/11/2025, 5:08:29 AM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats