Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-64574: Cross-site Scripting (Stored XSS) (CWE-79) in Adobe Adobe Experience Manager

0
Medium
VulnerabilityCVE-2025-64574cvecve-2025-64574cwe-79
Published: Wed Dec 10 2025 (12/10/2025, 18:24:19 UTC)
Source: CVE Database V5
Vendor/Project: Adobe
Product: Adobe Experience Manager

Description

Adobe Experience Manager versions 6.5.23 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field.

AI-Powered Analysis

AILast updated: 12/10/2025, 19:12:22 UTC

Technical Analysis

CVE-2025-64574 is a stored Cross-Site Scripting (XSS) vulnerability identified in Adobe Experience Manager (AEM) versions 6.5.23 and earlier. This vulnerability arises from insufficient sanitization of user input in form fields, allowing a low-privileged attacker to inject malicious JavaScript code that is persistently stored on the server. When a victim user accesses the affected page containing the injected script, the malicious code executes in their browser context. The vulnerability is classified under CWE-79, which covers improper neutralization of input during web page generation. The CVSS 3.1 base score of 5.4 reflects that the attack vector is network-based (AV:N), requires low privileges (PR:L), and user interaction (UI:R), with a scope change (S:C) indicating that the vulnerability affects resources beyond the initially vulnerable component. The impact includes limited confidentiality and integrity loss, such as session hijacking or unauthorized actions performed on behalf of the user, but no direct availability impact. No known public exploits or patches are available as of the publication date, increasing the urgency for organizations to implement mitigations proactively. The vulnerability is particularly critical in environments where AEM is used to manage public-facing or internal web content, as attackers could leverage XSS to conduct phishing, credential theft, or lateral movement within networks.

Potential Impact

For European organizations, the impact of CVE-2025-64574 can be significant, especially for those relying on Adobe Experience Manager for content management and digital experience delivery. Exploitation could lead to unauthorized access to user sessions, theft of sensitive data such as authentication tokens or personal information, and potential defacement or manipulation of web content. This can damage organizational reputation, lead to regulatory non-compliance (e.g., GDPR violations due to data leakage), and cause operational disruptions. Since the vulnerability requires user interaction and low privileges, phishing or social engineering campaigns could be used to increase exploitation success. The scope change in the vulnerability means that the attacker could affect users beyond the initially compromised component, potentially impacting a wide range of users and systems. European sectors such as government, finance, healthcare, and large enterprises that use AEM extensively are at higher risk. The absence of known exploits currently provides a window for mitigation but also means organizations should act before attackers develop weaponized code.

Mitigation Recommendations

To mitigate CVE-2025-64574 effectively, European organizations should: 1) Apply strict input validation and sanitization on all form fields within Adobe Experience Manager to prevent malicious script injection. 2) Implement robust output encoding/escaping mechanisms to ensure that any user-supplied data rendered in web pages does not execute as code. 3) Restrict the privileges of users who can submit data to vulnerable forms, minimizing the attack surface. 4) Monitor web application logs and user activity for unusual or suspicious input patterns indicative of attempted XSS exploitation. 5) Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in browsers. 6) Keep Adobe Experience Manager updated and watch for official patches or security advisories from Adobe to remediate the vulnerability once available. 7) Conduct security awareness training to reduce the risk of successful phishing or social engineering attacks that could facilitate exploitation. 8) Use web application firewalls (WAFs) with rules tailored to detect and block XSS payloads targeting AEM. These measures combined will reduce the likelihood and impact of exploitation beyond generic advice.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
adobe
Date Reserved
2025-11-05T22:51:33.028Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6939bda9fe7b3954b690b300

Added to database: 12/10/2025, 6:36:25 PM

Last enriched: 12/10/2025, 7:12:22 PM

Last updated: 12/11/2025, 6:59:01 AM

Views: 2

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats