CVE-2025-64590: Cross-site Scripting (Stored XSS) (CWE-79) in Adobe Adobe Experience Manager
Adobe Experience Manager versions 6.5.23 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field.
AI Analysis
Technical Summary
CVE-2025-64590 is a stored Cross-Site Scripting (XSS) vulnerability classified under CWE-79 that affects Adobe Experience Manager (AEM) versions 6.5.23 and earlier. Stored XSS occurs when malicious scripts are permanently stored on a target server, such as within form fields, and later executed in the browsers of users accessing the affected content. In this case, a low-privileged attacker can inject arbitrary JavaScript code into vulnerable form fields within AEM. When legitimate users browse pages containing these fields, the malicious script executes in their browser context, potentially leading to session hijacking, credential theft, or unauthorized actions performed on behalf of the user. The vulnerability requires the attacker to have some privileges to submit data but does not require elevated rights. User interaction is necessary as the victim must visit the compromised page. The CVSS v3.1 score is 5.4 (medium severity), reflecting network attack vector, low attack complexity, low privileges required, user interaction needed, and partial impact on confidentiality and integrity but no impact on availability. No public exploits have been reported yet, but the vulnerability is published and should be addressed promptly. Adobe Experience Manager is widely used by enterprises for managing digital content and customer experiences, making this vulnerability a significant risk for organizations relying on it for their web presence and customer interactions.
Potential Impact
For European organizations, this vulnerability poses a risk primarily to the confidentiality and integrity of user data and sessions. Exploitation could allow attackers to steal sensitive information such as authentication tokens, personal data, or perform unauthorized actions on behalf of users, potentially leading to data breaches or reputational damage. Since AEM is often used by government agencies, financial institutions, and large enterprises in Europe to manage public-facing websites and internal portals, the impact could extend to critical services and citizen data. The medium severity rating indicates that while the vulnerability is not immediately catastrophic, it can be leveraged as part of a broader attack chain or social engineering campaigns. The lack of known exploits in the wild currently reduces immediate risk but does not eliminate the threat, especially as attackers often develop exploits after public disclosure. Organizations failing to address this vulnerability may face compliance issues under GDPR if personal data is compromised. Additionally, the vulnerability could be exploited to distribute malware or phishing content via trusted websites, increasing the risk of wider compromise.
Mitigation Recommendations
European organizations should implement a multi-layered mitigation strategy beyond generic patching advice. First, they should upgrade Adobe Experience Manager to a version later than 6.5.23 once Adobe releases a patch addressing CVE-2025-64590. Until a patch is available, organizations should apply strict input validation and sanitization on all user-submitted data in AEM forms to prevent malicious script injection. Implementing Content Security Policy (CSP) headers can help restrict the execution of unauthorized scripts in browsers. Review and minimize user privileges to limit who can submit data to vulnerable forms, reducing the attack surface. Conduct thorough security testing and code reviews on custom AEM components that handle user input. Monitor web server and application logs for suspicious activity indicative of XSS attempts. Educate users and administrators about the risks of XSS and encourage cautious behavior when interacting with web content. Finally, consider deploying web application firewalls (WAFs) configured to detect and block XSS payloads targeting AEM endpoints.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Italy, Spain
CVE-2025-64590: Cross-site Scripting (Stored XSS) (CWE-79) in Adobe Adobe Experience Manager
Description
Adobe Experience Manager versions 6.5.23 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field.
AI-Powered Analysis
Technical Analysis
CVE-2025-64590 is a stored Cross-Site Scripting (XSS) vulnerability classified under CWE-79 that affects Adobe Experience Manager (AEM) versions 6.5.23 and earlier. Stored XSS occurs when malicious scripts are permanently stored on a target server, such as within form fields, and later executed in the browsers of users accessing the affected content. In this case, a low-privileged attacker can inject arbitrary JavaScript code into vulnerable form fields within AEM. When legitimate users browse pages containing these fields, the malicious script executes in their browser context, potentially leading to session hijacking, credential theft, or unauthorized actions performed on behalf of the user. The vulnerability requires the attacker to have some privileges to submit data but does not require elevated rights. User interaction is necessary as the victim must visit the compromised page. The CVSS v3.1 score is 5.4 (medium severity), reflecting network attack vector, low attack complexity, low privileges required, user interaction needed, and partial impact on confidentiality and integrity but no impact on availability. No public exploits have been reported yet, but the vulnerability is published and should be addressed promptly. Adobe Experience Manager is widely used by enterprises for managing digital content and customer experiences, making this vulnerability a significant risk for organizations relying on it for their web presence and customer interactions.
Potential Impact
For European organizations, this vulnerability poses a risk primarily to the confidentiality and integrity of user data and sessions. Exploitation could allow attackers to steal sensitive information such as authentication tokens, personal data, or perform unauthorized actions on behalf of users, potentially leading to data breaches or reputational damage. Since AEM is often used by government agencies, financial institutions, and large enterprises in Europe to manage public-facing websites and internal portals, the impact could extend to critical services and citizen data. The medium severity rating indicates that while the vulnerability is not immediately catastrophic, it can be leveraged as part of a broader attack chain or social engineering campaigns. The lack of known exploits in the wild currently reduces immediate risk but does not eliminate the threat, especially as attackers often develop exploits after public disclosure. Organizations failing to address this vulnerability may face compliance issues under GDPR if personal data is compromised. Additionally, the vulnerability could be exploited to distribute malware or phishing content via trusted websites, increasing the risk of wider compromise.
Mitigation Recommendations
European organizations should implement a multi-layered mitigation strategy beyond generic patching advice. First, they should upgrade Adobe Experience Manager to a version later than 6.5.23 once Adobe releases a patch addressing CVE-2025-64590. Until a patch is available, organizations should apply strict input validation and sanitization on all user-submitted data in AEM forms to prevent malicious script injection. Implementing Content Security Policy (CSP) headers can help restrict the execution of unauthorized scripts in browsers. Review and minimize user privileges to limit who can submit data to vulnerable forms, reducing the attack surface. Conduct thorough security testing and code reviews on custom AEM components that handle user input. Monitor web server and application logs for suspicious activity indicative of XSS attempts. Educate users and administrators about the risks of XSS and encourage cautious behavior when interacting with web content. Finally, consider deploying web application firewalls (WAFs) configured to detect and block XSS payloads targeting AEM endpoints.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- adobe
- Date Reserved
- 2025-11-05T22:53:10.940Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6939bdaafe7b3954b690b32e
Added to database: 12/10/2025, 6:36:26 PM
Last enriched: 12/17/2025, 7:42:50 PM
Last updated: 2/7/2026, 11:04:30 AM
Views: 35
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2083: SQL Injection in code-projects Social Networking Site
MediumCVE-2026-2082: OS Command Injection in D-Link DIR-823X
MediumCVE-2026-2080: Command Injection in UTT HiPER 810
HighCVE-2026-2079: Improper Authorization in yeqifu warehouse
MediumCVE-2026-1675: CWE-1188 Initialization of a Resource with an Insecure Default in brstefanovic Advanced Country Blocker
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.