Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-64548: Cross-site Scripting (Stored XSS) (CWE-79) in Adobe Adobe Experience Manager

0
Medium
VulnerabilityCVE-2025-64548cvecve-2025-64548cwe-79
Published: Wed Dec 10 2025 (12/10/2025, 18:24:13 UTC)
Source: CVE Database V5
Vendor/Project: Adobe
Product: Adobe Experience Manager

Description

CVE-2025-64548 is a stored Cross-Site Scripting (XSS) vulnerability affecting Adobe Experience Manager (AEM) versions 6. 5. 23 and earlier. A low privileged attacker can inject malicious JavaScript into vulnerable form fields, which executes in the browsers of users who visit the affected pages. This vulnerability requires user interaction and low privileges but can impact confidentiality and integrity by stealing session tokens or performing actions on behalf of users. The CVSS score is 5. 4 (medium severity), reflecting network exploitability with low attack complexity but requiring user interaction and privileges. No known exploits are currently reported in the wild. European organizations using AEM for web content management are at risk, especially those with public-facing portals. Mitigation includes applying patches when available, sanitizing and validating user inputs, employing Content Security Policy (CSP), and monitoring web traffic for suspicious activity.

AI-Powered Analysis

AILast updated: 12/17/2025, 20:55:19 UTC

Technical Analysis

CVE-2025-64548 is a stored Cross-Site Scripting (XSS) vulnerability identified in Adobe Experience Manager (AEM) versions 6.5.23 and earlier. This vulnerability allows a low privileged attacker to inject malicious JavaScript code into vulnerable form fields within the AEM-managed web application. When a victim user accesses the affected page containing the injected script, the malicious code executes in their browser context. The attack vector is network-based, with low attack complexity, requiring the attacker to have some privileges and user interaction for the payload to execute. The vulnerability impacts confidentiality and integrity by potentially enabling session hijacking, credential theft, or unauthorized actions performed on behalf of the victim user. The scope is changed (S:C) because the vulnerability affects resources beyond the attacker’s privileges once exploited. The CVSS 3.1 base score is 5.4, indicating medium severity. No patches are currently linked, and no known exploits are reported in the wild as of publication. The vulnerability stems from insufficient input sanitization and output encoding in form fields, a common weakness categorized under CWE-79. Adobe Experience Manager is widely used by enterprises and public sector organizations for content management, making this vulnerability significant for organizations relying on AEM for their web presence. Attackers exploiting this flaw could compromise user sessions and gain unauthorized access to sensitive information or perform actions with victim user privileges. The vulnerability requires user interaction (UI:R), meaning the victim must visit the maliciously crafted page for exploitation. The attacker must have low privileges (PR:L), which lowers the barrier to exploitation compared to vulnerabilities requiring higher privileges. The vulnerability does not affect availability directly but can cause reputational damage and data breaches. Given the widespread use of AEM in Europe, especially in government and large enterprises, this vulnerability poses a tangible risk to European organizations. Mitigation is complicated by the lack of an immediate patch but can be addressed by implementing robust input validation, output encoding, and Content Security Policies to restrict script execution. Monitoring and incident response readiness are also critical to detect and respond to exploitation attempts.

Potential Impact

For European organizations, the impact of CVE-2025-64548 can be significant, particularly for those using Adobe Experience Manager to manage public-facing websites or intranet portals. Successful exploitation can lead to theft of session cookies, enabling attackers to impersonate legitimate users and access sensitive information or perform unauthorized actions. This can result in data breaches, loss of customer trust, and regulatory penalties under GDPR if personal data is compromised. The integrity of web content and user interactions can be undermined, potentially allowing attackers to inject misleading or malicious content. Although availability is not directly impacted, the reputational damage and potential downtime for remediation can be costly. Organizations in sectors such as government, finance, healthcare, and media, which rely heavily on AEM, are at higher risk. The requirement for low privileges and user interaction lowers the exploitation barrier, increasing the likelihood of targeted attacks or phishing campaigns leveraging this vulnerability. The medium severity rating indicates that while the vulnerability is not critical, it still poses a meaningful threat that must be addressed promptly to avoid exploitation and downstream impacts.

Mitigation Recommendations

1. Apply official Adobe patches and updates as soon as they become available to address CVE-2025-64548. 2. Implement strict input validation and output encoding on all form fields to prevent injection of malicious scripts. 3. Deploy Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts and reduce the impact of XSS attacks. 4. Limit user privileges to the minimum necessary to reduce the attack surface, especially for users who can submit data to vulnerable forms. 5. Conduct regular security assessments and penetration testing focused on web application vulnerabilities, including XSS. 6. Monitor web traffic and logs for unusual activity indicative of exploitation attempts, such as unexpected script injections or anomalous user behavior. 7. Educate users about the risks of clicking on suspicious links or interacting with untrusted content to reduce the chance of successful exploitation. 8. Use web application firewalls (WAFs) with rules designed to detect and block XSS payloads targeting AEM. 9. Review and harden AEM configurations to disable or restrict features that allow untrusted input where possible. 10. Prepare incident response plans to quickly contain and remediate any exploitation events involving this vulnerability.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
adobe
Date Reserved
2025-11-05T22:51:33.022Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6939bda5fe7b3954b690ae07

Added to database: 12/10/2025, 6:36:21 PM

Last enriched: 12/17/2025, 8:55:19 PM

Last updated: 2/4/2026, 11:51:53 PM

Views: 27

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats