Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-64601: Cross-site Scripting (Stored XSS) (CWE-79) in Adobe Adobe Experience Manager

0
Medium
VulnerabilityCVE-2025-64601cvecve-2025-64601cwe-79
Published: Wed Dec 10 2025 (12/10/2025, 18:23:56 UTC)
Source: CVE Database V5
Vendor/Project: Adobe
Product: Adobe Experience Manager

Description

CVE-2025-64601 is a stored Cross-Site Scripting (XSS) vulnerability affecting Adobe Experience Manager (AEM) versions 6. 5. 23 and earlier. A low-privileged attacker can inject malicious JavaScript into vulnerable form fields, which executes in the browsers of users who visit the affected pages. This vulnerability requires user interaction and privileges to submit data but can lead to confidentiality and integrity impacts by stealing session tokens or manipulating page content. The CVSS score is 5. 4 (medium severity), reflecting network attack vector, low complexity, and partial impact on confidentiality and integrity. No known exploits are currently in the wild, and no patches have been linked yet. European organizations using AEM for content management and digital experience delivery are at risk, especially in countries with high adoption of Adobe products and significant digital infrastructure. Mitigation requires prompt patching once available, input validation, output encoding, and restricting form field access.

AI-Powered Analysis

AILast updated: 12/17/2025, 21:00:40 UTC

Technical Analysis

CVE-2025-64601 is a stored Cross-Site Scripting (XSS) vulnerability identified in Adobe Experience Manager (AEM) versions 6.5.23 and earlier. The vulnerability arises from insufficient sanitization of user input in certain form fields, allowing a low-privileged attacker to inject malicious JavaScript code that is persistently stored on the server. When other users access the affected pages containing the injected scripts, the malicious code executes within their browsers under the context of the vulnerable site. This can lead to unauthorized actions such as session hijacking, credential theft, or manipulation of displayed content, impacting confidentiality and integrity. The vulnerability has a CVSS 3.1 base score of 5.4, indicating medium severity. The attack vector is network-based, with low attack complexity, requiring low privileges and user interaction (victim must visit the compromised page). The scope is changed, meaning the vulnerability affects components beyond the initially vulnerable module. No known exploits have been reported in the wild, and no official patches have been published at the time of disclosure. Adobe Experience Manager is widely used by enterprises and public sector organizations for managing digital content and customer experiences, making this vulnerability significant in environments where AEM is deployed. The vulnerability’s exploitation could facilitate further attacks such as phishing, privilege escalation, or data exfiltration if combined with other weaknesses.

Potential Impact

For European organizations, the impact of CVE-2025-64601 can be significant, especially for those relying heavily on Adobe Experience Manager for web content management and digital experience platforms. Exploitation could lead to unauthorized access to sensitive information, including session tokens and user credentials, potentially enabling attackers to impersonate legitimate users or administrators. This compromises confidentiality and integrity of data and may facilitate further attacks such as lateral movement or deployment of malware. The vulnerability does not directly affect availability but can undermine trust in affected web services, causing reputational damage and potential regulatory scrutiny under GDPR if personal data is compromised. Organizations in sectors such as finance, government, healthcare, and e-commerce, which often use AEM for customer-facing portals, are particularly at risk. The requirement for user interaction (visiting a maliciously crafted page) means social engineering or phishing campaigns could be used to increase exploitation success. Given the widespread use of Adobe products in Europe, the threat could have broad implications if not addressed promptly.

Mitigation Recommendations

1. Monitor Adobe’s official security advisories closely and apply patches or updates for Adobe Experience Manager as soon as they become available. 2. Implement strict input validation and output encoding on all form fields to prevent injection of malicious scripts, even before official patches are released. 3. Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in browsers. 4. Limit user privileges to the minimum necessary, reducing the ability of low-privileged users to inject malicious content. 5. Conduct regular security audits and penetration testing focusing on web application vulnerabilities, including XSS. 6. Educate users and administrators about phishing and social engineering risks to reduce the likelihood of user interaction with malicious links. 7. Use web application firewalls (WAFs) configured to detect and block common XSS attack patterns targeting AEM. 8. Review and harden AEM configurations, disabling unnecessary features or components that could be exploited. 9. Implement robust logging and monitoring to detect suspicious activities related to form submissions and script injections. 10. Consider isolating critical AEM instances or sensitive content behind additional authentication layers or network segmentation.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
adobe
Date Reserved
2025-11-05T22:53:10.941Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6939bdacfe7b3954b690bb43

Added to database: 12/10/2025, 6:36:28 PM

Last enriched: 12/17/2025, 9:00:40 PM

Last updated: 2/4/2026, 4:11:40 AM

Views: 24

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats