Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-64566: Cross-site Scripting (DOM-based XSS) (CWE-79) in Adobe Adobe Experience Manager

0
Medium
VulnerabilityCVE-2025-64566cvecve-2025-64566cwe-79
Published: Wed Dec 10 2025 (12/10/2025, 18:23:37 UTC)
Source: CVE Database V5
Vendor/Project: Adobe
Product: Adobe Experience Manager

Description

Adobe Experience Manager versions 6.5.23 and earlier are affected by a DOM-based Cross-Site Scripting (XSS) vulnerability that could be exploited by a low privileged attacker to execute malicious scripts in the context of the victim's browser. Exploitation of this issue requires user interaction, such as visiting a crafted URL or interacting with a manipulated web page.

AI-Powered Analysis

AILast updated: 12/10/2025, 19:11:31 UTC

Technical Analysis

CVE-2025-64566 is a DOM-based Cross-Site Scripting (XSS) vulnerability identified in Adobe Experience Manager (AEM) versions 6.5.23 and earlier. This vulnerability arises from improper handling of untrusted data in the client-side scripts, allowing an attacker to inject malicious JavaScript code that executes within the victim's browser context. The attack vector involves a low-privileged attacker crafting a malicious URL or manipulated web page that, when visited or interacted with by a user, triggers the execution of the injected script. The vulnerability is classified under CWE-79, which pertains to improper neutralization of input during web page generation. The CVSS 3.1 base score of 5.4 reflects a medium severity level, with the vector indicating network attack vector (AV:N), low attack complexity (AC:L), requiring privileges (PR:L), user interaction (UI:R), scope change (S:C), and impacts on confidentiality (C:L) and integrity (I:L) but no impact on availability (A:N). The scope change indicates that the vulnerability affects components beyond the initially vulnerable component, potentially impacting the broader application environment. Exploitation could lead to theft of sensitive information such as session tokens, user credentials, or other data accessible within the browser context, as well as unauthorized actions performed on behalf of the user. Although no known exploits are currently reported in the wild, the presence of this vulnerability in widely deployed AEM instances poses a significant risk. The lack of available patches at the time of publication necessitates immediate attention to alternative mitigation strategies. Given AEM's role in managing digital content and customer experiences for many enterprises, successful exploitation could undermine user trust and lead to reputational damage.

Potential Impact

For European organizations, the impact of CVE-2025-64566 can be substantial, particularly for those relying on Adobe Experience Manager to deliver digital content and services. Successful exploitation could result in unauthorized disclosure of sensitive user data, including personal information and authentication tokens, leading to privacy violations under GDPR. Attackers could leverage the vulnerability to perform session hijacking, enabling unauthorized access to user accounts and potentially sensitive business information. The manipulation of web content could also facilitate phishing attacks or the distribution of malware, further compromising organizational security. Although the vulnerability does not directly affect system availability, the indirect consequences such as loss of customer trust, regulatory penalties, and remediation costs could be significant. European organizations with public-facing AEM portals are especially vulnerable, as these interfaces are accessible to external attackers. The medium severity rating reflects the need for timely mitigation to prevent exploitation, particularly given the requirement for user interaction which can be mitigated through user awareness and technical controls.

Mitigation Recommendations

1. Monitor Adobe's official security advisories closely and apply patches or updates as soon as they become available for Adobe Experience Manager versions 6.5.23 and earlier. 2. Implement strict client-side input validation and output encoding to neutralize untrusted data before it is processed or rendered in the browser, reducing the risk of DOM-based XSS. 3. Employ Content Security Policy (CSP) headers configured to restrict the execution of inline scripts and limit the sources from which scripts can be loaded, thereby mitigating the impact of injected scripts. 4. Conduct regular security assessments and penetration testing focused on client-side scripting and input handling within AEM implementations. 5. Educate end-users and administrators about the risks of interacting with suspicious URLs or web content, emphasizing cautious behavior to reduce the likelihood of successful exploitation. 6. Use web application firewalls (WAFs) with rules tailored to detect and block XSS attack patterns targeting AEM environments. 7. Review and harden AEM configurations to minimize exposure of vulnerable components and restrict access to trusted users where feasible. 8. Implement multi-factor authentication (MFA) for administrative and user accounts to reduce the impact of credential theft resulting from XSS attacks.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
adobe
Date Reserved
2025-11-05T22:51:33.026Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6939bda7fe7b3954b690b2ec

Added to database: 12/10/2025, 6:36:23 PM

Last enriched: 12/10/2025, 7:11:31 PM

Last updated: 12/11/2025, 7:07:44 AM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats