CVE-2025-64601: Cross-site Scripting (Stored XSS) (CWE-79) in Adobe Adobe Experience Manager
CVE-2025-64601 is a stored Cross-Site Scripting (XSS) vulnerability affecting Adobe Experience Manager (AEM) versions 6. 5. 23 and earlier. A low-privileged attacker can inject malicious JavaScript into vulnerable form fields, which executes in the browsers of users who visit the affected pages. This vulnerability requires user interaction and privileges to submit data but can lead to confidentiality and integrity impacts by stealing session tokens or manipulating page content. The CVSS score is 5. 4 (medium severity), reflecting network attack vector, low complexity, and partial impact on confidentiality and integrity. No known exploits are currently in the wild, and no patches have been linked yet. European organizations using AEM for content management and digital experience delivery are at risk, especially in countries with high adoption of Adobe products and significant digital infrastructure. Mitigation requires prompt patching once available, input validation, output encoding, and restricting form field access.
AI Analysis
Technical Summary
CVE-2025-64601 is a stored Cross-Site Scripting (XSS) vulnerability identified in Adobe Experience Manager (AEM) versions 6.5.23 and earlier. The vulnerability arises from insufficient sanitization of user input in certain form fields, allowing a low-privileged attacker to inject malicious JavaScript code that is persistently stored on the server. When other users access the affected pages containing the injected scripts, the malicious code executes within their browsers under the context of the vulnerable site. This can lead to unauthorized actions such as session hijacking, credential theft, or manipulation of displayed content, impacting confidentiality and integrity. The vulnerability has a CVSS 3.1 base score of 5.4, indicating medium severity. The attack vector is network-based, with low attack complexity, requiring low privileges and user interaction (victim must visit the compromised page). The scope is changed, meaning the vulnerability affects components beyond the initially vulnerable module. No known exploits have been reported in the wild, and no official patches have been published at the time of disclosure. Adobe Experience Manager is widely used by enterprises and public sector organizations for managing digital content and customer experiences, making this vulnerability significant in environments where AEM is deployed. The vulnerability’s exploitation could facilitate further attacks such as phishing, privilege escalation, or data exfiltration if combined with other weaknesses.
Potential Impact
For European organizations, the impact of CVE-2025-64601 can be significant, especially for those relying heavily on Adobe Experience Manager for web content management and digital experience platforms. Exploitation could lead to unauthorized access to sensitive information, including session tokens and user credentials, potentially enabling attackers to impersonate legitimate users or administrators. This compromises confidentiality and integrity of data and may facilitate further attacks such as lateral movement or deployment of malware. The vulnerability does not directly affect availability but can undermine trust in affected web services, causing reputational damage and potential regulatory scrutiny under GDPR if personal data is compromised. Organizations in sectors such as finance, government, healthcare, and e-commerce, which often use AEM for customer-facing portals, are particularly at risk. The requirement for user interaction (visiting a maliciously crafted page) means social engineering or phishing campaigns could be used to increase exploitation success. Given the widespread use of Adobe products in Europe, the threat could have broad implications if not addressed promptly.
Mitigation Recommendations
1. Monitor Adobe’s official security advisories closely and apply patches or updates for Adobe Experience Manager as soon as they become available. 2. Implement strict input validation and output encoding on all form fields to prevent injection of malicious scripts, even before official patches are released. 3. Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in browsers. 4. Limit user privileges to the minimum necessary, reducing the ability of low-privileged users to inject malicious content. 5. Conduct regular security audits and penetration testing focusing on web application vulnerabilities, including XSS. 6. Educate users and administrators about phishing and social engineering risks to reduce the likelihood of user interaction with malicious links. 7. Use web application firewalls (WAFs) configured to detect and block common XSS attack patterns targeting AEM. 8. Review and harden AEM configurations, disabling unnecessary features or components that could be exploited. 9. Implement robust logging and monitoring to detect suspicious activities related to form submissions and script injections. 10. Consider isolating critical AEM instances or sensitive content behind additional authentication layers or network segmentation.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden
CVE-2025-64601: Cross-site Scripting (Stored XSS) (CWE-79) in Adobe Adobe Experience Manager
Description
CVE-2025-64601 is a stored Cross-Site Scripting (XSS) vulnerability affecting Adobe Experience Manager (AEM) versions 6. 5. 23 and earlier. A low-privileged attacker can inject malicious JavaScript into vulnerable form fields, which executes in the browsers of users who visit the affected pages. This vulnerability requires user interaction and privileges to submit data but can lead to confidentiality and integrity impacts by stealing session tokens or manipulating page content. The CVSS score is 5. 4 (medium severity), reflecting network attack vector, low complexity, and partial impact on confidentiality and integrity. No known exploits are currently in the wild, and no patches have been linked yet. European organizations using AEM for content management and digital experience delivery are at risk, especially in countries with high adoption of Adobe products and significant digital infrastructure. Mitigation requires prompt patching once available, input validation, output encoding, and restricting form field access.
AI-Powered Analysis
Technical Analysis
CVE-2025-64601 is a stored Cross-Site Scripting (XSS) vulnerability identified in Adobe Experience Manager (AEM) versions 6.5.23 and earlier. The vulnerability arises from insufficient sanitization of user input in certain form fields, allowing a low-privileged attacker to inject malicious JavaScript code that is persistently stored on the server. When other users access the affected pages containing the injected scripts, the malicious code executes within their browsers under the context of the vulnerable site. This can lead to unauthorized actions such as session hijacking, credential theft, or manipulation of displayed content, impacting confidentiality and integrity. The vulnerability has a CVSS 3.1 base score of 5.4, indicating medium severity. The attack vector is network-based, with low attack complexity, requiring low privileges and user interaction (victim must visit the compromised page). The scope is changed, meaning the vulnerability affects components beyond the initially vulnerable module. No known exploits have been reported in the wild, and no official patches have been published at the time of disclosure. Adobe Experience Manager is widely used by enterprises and public sector organizations for managing digital content and customer experiences, making this vulnerability significant in environments where AEM is deployed. The vulnerability’s exploitation could facilitate further attacks such as phishing, privilege escalation, or data exfiltration if combined with other weaknesses.
Potential Impact
For European organizations, the impact of CVE-2025-64601 can be significant, especially for those relying heavily on Adobe Experience Manager for web content management and digital experience platforms. Exploitation could lead to unauthorized access to sensitive information, including session tokens and user credentials, potentially enabling attackers to impersonate legitimate users or administrators. This compromises confidentiality and integrity of data and may facilitate further attacks such as lateral movement or deployment of malware. The vulnerability does not directly affect availability but can undermine trust in affected web services, causing reputational damage and potential regulatory scrutiny under GDPR if personal data is compromised. Organizations in sectors such as finance, government, healthcare, and e-commerce, which often use AEM for customer-facing portals, are particularly at risk. The requirement for user interaction (visiting a maliciously crafted page) means social engineering or phishing campaigns could be used to increase exploitation success. Given the widespread use of Adobe products in Europe, the threat could have broad implications if not addressed promptly.
Mitigation Recommendations
1. Monitor Adobe’s official security advisories closely and apply patches or updates for Adobe Experience Manager as soon as they become available. 2. Implement strict input validation and output encoding on all form fields to prevent injection of malicious scripts, even before official patches are released. 3. Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in browsers. 4. Limit user privileges to the minimum necessary, reducing the ability of low-privileged users to inject malicious content. 5. Conduct regular security audits and penetration testing focusing on web application vulnerabilities, including XSS. 6. Educate users and administrators about phishing and social engineering risks to reduce the likelihood of user interaction with malicious links. 7. Use web application firewalls (WAFs) configured to detect and block common XSS attack patterns targeting AEM. 8. Review and harden AEM configurations, disabling unnecessary features or components that could be exploited. 9. Implement robust logging and monitoring to detect suspicious activities related to form submissions and script injections. 10. Consider isolating critical AEM instances or sensitive content behind additional authentication layers or network segmentation.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- adobe
- Date Reserved
- 2025-11-05T22:53:10.941Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6939bdacfe7b3954b690bb43
Added to database: 12/10/2025, 6:36:28 PM
Last enriched: 12/17/2025, 9:00:40 PM
Last updated: 2/4/2026, 4:11:40 AM
Views: 24
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-1791: CWE-434 Unrestricted Upload of File with Dangerous Type in Hillstone Networks Operation and Maintenance Security Gateway
LowCVE-2026-1835: Cross-Site Request Forgery in lcg0124 BootDo
MediumCVE-2026-1813: Unrestricted Upload in bolo-blog bolo-solo
MediumCVE-2026-1632: CWE-306 Missing Authentication for Critical Function in RISS SRL MOMA Seismic Station
CriticalCVE-2026-1812: Path Traversal in bolo-blog bolo-solo
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.