Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-64565: Cross-site Scripting (DOM-based XSS) (CWE-79) in Adobe Adobe Experience Manager

0
Medium
VulnerabilityCVE-2025-64565cvecve-2025-64565cwe-79
Published: Wed Dec 10 2025 (12/10/2025, 18:23:53 UTC)
Source: CVE Database V5
Vendor/Project: Adobe
Product: Adobe Experience Manager

Description

CVE-2025-64565 is a DOM-based Cross-Site Scripting (XSS) vulnerability affecting Adobe Experience Manager (AEM) versions 6. 5. 23 and earlier. This vulnerability allows a low-privileged attacker to execute malicious scripts in the context of a victim's browser by tricking the user into interacting with a crafted URL or manipulated web page. Exploitation requires user interaction, such as clicking a link or visiting a malicious page. The vulnerability impacts confidentiality and integrity but does not affect availability. The CVSS score is 5. 4 (medium severity), reflecting the need for user interaction and limited privileges required for exploitation. European organizations using AEM for content management and digital experience delivery could be targeted, especially those with public-facing web portals. Mitigation involves applying patches once available, implementing strict input validation and output encoding in client-side scripts, and educating users about phishing risks.

AI-Powered Analysis

AILast updated: 12/17/2025, 20:59:51 UTC

Technical Analysis

CVE-2025-64565 is a DOM-based Cross-Site Scripting vulnerability identified in Adobe Experience Manager (AEM) versions 6.5.23 and earlier. This vulnerability arises from improper handling of client-side scripts that process user-controllable input, allowing an attacker to inject malicious JavaScript code that executes within the victim's browser context. The attack vector requires a low-privileged attacker to craft a malicious URL or web page that, when visited or interacted with by a user, triggers the execution of the injected script. This can lead to the theft of sensitive information such as session tokens, cookies, or other confidential data accessible via the browser, and potentially allow the attacker to perform actions on behalf of the victim within the affected web application. The vulnerability is classified under CWE-79, indicating a Cross-Site Scripting flaw, and is DOM-based, meaning the vulnerability exists in client-side code rather than server-side. The CVSS 3.1 base score of 5.4 reflects a medium severity, considering the attack complexity is low, but user interaction is required, and the attacker must have some privileges. The scope is changed (S:C), indicating that exploitation can affect components beyond the vulnerable code. No patches were linked at the time of publication, and no known exploits have been reported in the wild. Adobe Experience Manager is widely used by enterprises for managing digital content and customer experiences, making this vulnerability relevant for organizations relying on AEM for their web presence and digital services.

Potential Impact

For European organizations, this vulnerability poses a risk to the confidentiality and integrity of user data accessed through Adobe Experience Manager portals. Attackers exploiting this vulnerability could steal session cookies, enabling account hijacking, or manipulate web content to conduct phishing or fraud. This can damage organizational reputation, lead to regulatory non-compliance under GDPR due to data breaches, and disrupt customer trust. Since AEM is commonly used by government agencies, financial institutions, and large enterprises in Europe for content management and digital marketing, the impact could be significant if exploited. The requirement for user interaction limits automated exploitation but does not eliminate risk, especially in environments with high user traffic or where social engineering is effective. The vulnerability does not affect system availability, so denial-of-service is not a concern here. However, the potential for lateral movement or privilege escalation through stolen credentials or session tokens could increase the overall risk profile.

Mitigation Recommendations

1. Monitor Adobe's official channels for patches addressing CVE-2025-64565 and apply them promptly once released. 2. Implement strict client-side input validation and output encoding to sanitize user-controllable inputs processed by JavaScript in AEM pages, reducing the risk of DOM-based XSS. 3. Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts and mitigate the impact of injected malicious code. 4. Educate end-users and administrators about the risks of clicking unknown or suspicious links, emphasizing phishing awareness to reduce user interaction exploitation. 5. Regularly audit and review custom client-side scripts and third-party components integrated with AEM for insecure coding practices that could facilitate DOM-based XSS. 6. Use web application firewalls (WAF) with rules tuned to detect and block XSS attack patterns targeting AEM endpoints. 7. Implement multi-factor authentication (MFA) to reduce the impact of stolen session tokens or credentials. 8. Conduct security testing, including penetration testing focused on client-side vulnerabilities, to identify and remediate similar issues proactively.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
adobe
Date Reserved
2025-11-05T22:51:33.026Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6939bda7fe7b3954b690b2e9

Added to database: 12/10/2025, 6:36:23 PM

Last enriched: 12/17/2025, 8:59:51 PM

Last updated: 2/4/2026, 4:21:25 AM

Views: 23

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats