Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-64612: Cross-site Scripting (Stored XSS) (CWE-79) in Adobe Adobe Experience Manager

0
Medium
VulnerabilityCVE-2025-64612cvecve-2025-64612cwe-79
Published: Wed Dec 10 2025 (12/10/2025, 18:23:27 UTC)
Source: CVE Database V5
Vendor/Project: Adobe
Product: Adobe Experience Manager

Description

Adobe Experience Manager versions 6.5.23 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field.

AI-Powered Analysis

AILast updated: 12/17/2025, 19:44:16 UTC

Technical Analysis

CVE-2025-64612 is a stored Cross-Site Scripting (XSS) vulnerability identified in Adobe Experience Manager (AEM) versions 6.5.23 and earlier. Stored XSS occurs when malicious scripts submitted by an attacker are permanently stored on the target server, such as within form fields, and later executed in the browsers of users who access the affected content. In this case, a low-privileged attacker can exploit vulnerable form fields in AEM to inject JavaScript code. When other users visit the page containing the injected script, their browsers execute the malicious code, potentially leading to session hijacking, credential theft, or unauthorized actions performed on behalf of the victim. The vulnerability has a CVSS v3.1 base score of 5.4, indicating medium severity. The vector metrics specify that the attack can be launched remotely over the network (AV:N), requires low attack complexity (AC:L), needs privileges (PR:L), and requires user interaction (UI:R). The scope is changed (S:C), meaning the vulnerability affects resources beyond the initially vulnerable component. The impact affects confidentiality and integrity partially (C:L/I:L) but does not affect availability (A:N). No public exploits have been reported yet, but the presence of stored XSS in a widely used enterprise content management system poses a significant risk. Adobe Experience Manager is widely deployed in enterprises for managing digital content and customer experiences, making this vulnerability relevant for organizations relying on AEM for their web presence and internal portals. Attackers exploiting this vulnerability could steal sensitive information, manipulate displayed content, or conduct phishing attacks by injecting malicious scripts that appear legitimate to users.

Potential Impact

For European organizations, the impact of CVE-2025-64612 can be significant, especially for those using Adobe Experience Manager to manage customer-facing websites or internal portals. Successful exploitation can lead to theft of session cookies, user credentials, or other sensitive data, compromising user accounts and potentially allowing attackers to escalate privileges or move laterally within the network. The integrity of displayed content can be compromised, damaging organizational reputation and user trust. Since AEM is often integrated with other enterprise systems, the injected scripts could be used as a pivot point for further attacks. The requirement for user interaction and low privileges to exploit somewhat limits the attack surface but does not eliminate risk, especially in environments with many users or external visitors. The medium CVSS score reflects a moderate but non-trivial risk. European organizations in sectors such as finance, government, healthcare, and media, which rely heavily on web content management, may face regulatory and compliance consequences if user data is exposed or manipulated. Additionally, the cross-site scripting vulnerability could be leveraged in targeted phishing campaigns or social engineering attacks against European users.

Mitigation Recommendations

1. Apply official patches or updates from Adobe as soon as they become available to address this vulnerability directly. 2. Implement strict input validation and output encoding on all form fields and user-supplied data within Adobe Experience Manager to prevent injection of malicious scripts. 3. Deploy Content Security Policy (CSP) headers to restrict execution of unauthorized scripts and reduce the impact of XSS attacks. 4. Conduct regular security audits and code reviews focusing on input handling in AEM components and customizations. 5. Monitor web server and application logs for unusual or suspicious input patterns indicative of attempted XSS exploitation. 6. Educate users and administrators about the risks of XSS and encourage cautious behavior when interacting with web content. 7. Consider using web application firewalls (WAFs) with rules tuned to detect and block XSS payloads targeting AEM. 8. Limit privileges of users who can submit data to vulnerable forms to reduce the likelihood of malicious input. 9. Isolate critical AEM instances and restrict access to trusted networks to reduce exposure. 10. Maintain an incident response plan that includes procedures for handling XSS incidents and potential data breaches.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
adobe
Date Reserved
2025-11-05T22:53:10.942Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6939bdaefe7b3954b690bb82

Added to database: 12/10/2025, 6:36:30 PM

Last enriched: 12/17/2025, 7:44:16 PM

Last updated: 2/4/2026, 4:08:06 AM

Views: 24

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats