Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-64796: Cross-site Scripting (Stored XSS) (CWE-79) in Adobe Adobe Experience Manager

0
Medium
VulnerabilityCVE-2025-64796cvecve-2025-64796cwe-79
Published: Wed Dec 10 2025 (12/10/2025, 18:23:00 UTC)
Source: CVE Database V5
Vendor/Project: Adobe
Product: Adobe Experience Manager

Description

Adobe Experience Manager versions 6.5.23 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field.

AI-Powered Analysis

AILast updated: 12/10/2025, 19:03:00 UTC

Technical Analysis

CVE-2025-64796 is a stored Cross-Site Scripting (XSS) vulnerability identified in Adobe Experience Manager (AEM) versions 6.5.23 and earlier. This vulnerability arises from insufficient sanitization of user-supplied input in certain form fields, allowing an attacker with low privileges to inject malicious JavaScript code that is stored persistently on the server. When a victim user accesses the affected page, the malicious script executes in their browser context, potentially enabling session hijacking, credential theft, or unauthorized actions performed on behalf of the user. The vulnerability requires the attacker to have the ability to submit data to the vulnerable form fields, and the victim must interact with the compromised page for the exploit to succeed. The CVSS 3.1 base score of 5.4 reflects a medium severity, with an attack vector of network, low attack complexity, requiring privileges, and user interaction. The scope is changed, indicating that the vulnerability can affect resources beyond the initially vulnerable component. No public exploits have been reported yet, and no patches are currently linked, indicating that organizations should monitor Adobe advisories closely. The vulnerability falls under CWE-79, which is a common and well-understood web security issue. Given AEM's widespread use in enterprise content management, exploitation could lead to significant confidentiality and integrity risks, especially in environments where sensitive data or critical business processes are managed through AEM portals.

Potential Impact

For European organizations, the impact of CVE-2025-64796 can be significant, particularly for those relying on Adobe Experience Manager for public-facing websites, intranets, or customer portals. Exploitation could lead to unauthorized disclosure of sensitive information such as session tokens, personal data, or internal business information, violating GDPR and other data protection regulations. Integrity of displayed content could be compromised, potentially damaging organizational reputation and trust. Although availability impact is low, the ability to execute arbitrary scripts could facilitate further attacks like phishing, malware delivery, or lateral movement within the network. Sectors such as government, finance, healthcare, and large enterprises with complex web infrastructures are especially vulnerable. The requirement for user interaction and attacker privileges somewhat limits the attack surface but does not eliminate risk, as attackers may leverage social engineering or compromised low-privilege accounts. The lack of known exploits in the wild currently reduces immediate risk but should not lead to complacency.

Mitigation Recommendations

1. Monitor Adobe's official security advisories and apply patches or updates for Adobe Experience Manager as soon as they become available. 2. Implement strict input validation and output encoding on all user-supplied data in AEM forms to prevent script injection. 3. Use Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in browsers. 4. Conduct regular security audits and penetration testing focused on web application vulnerabilities, especially XSS. 5. Employ web application firewalls (WAFs) with rules tuned to detect and block XSS payloads targeting AEM. 6. Educate users and administrators about phishing and social engineering risks that could facilitate exploitation. 7. Restrict privileges for users who can submit data to vulnerable forms, minimizing the potential for malicious input. 8. Monitor logs for unusual form submissions or script execution patterns indicative of attempted exploitation. 9. Consider isolating or sandboxing critical AEM components to limit the scope of potential compromise. 10. Review and harden session management to mitigate session hijacking risks if XSS is exploited.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
adobe
Date Reserved
2025-11-11T22:48:38.825Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6939bdb1fe7b3954b690bbfb

Added to database: 12/10/2025, 6:36:33 PM

Last enriched: 12/10/2025, 7:03:00 PM

Last updated: 12/11/2025, 7:24:35 AM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats