Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-64822: Cross-site Scripting (Stored XSS) (CWE-79) in Adobe Adobe Experience Manager

0
Medium
VulnerabilityCVE-2025-64822cvecve-2025-64822cwe-79
Published: Wed Dec 10 2025 (12/10/2025, 18:23:48 UTC)
Source: CVE Database V5
Vendor/Project: Adobe
Product: Adobe Experience Manager

Description

CVE-2025-64822 is a stored Cross-Site Scripting (XSS) vulnerability affecting Adobe Experience Manager (AEM) versions 6. 5. 23 and earlier. A low-privileged attacker can inject malicious JavaScript into vulnerable form fields, which executes in the browsers of users who visit the affected pages. This vulnerability requires user interaction to trigger and does not allow direct system compromise but can lead to session hijacking, data theft, or further attacks within the context of the victim's browser. The CVSS score is 5. 4 (medium severity), reflecting the need for some privileges and user interaction. European organizations using AEM for web content management are at risk, especially those with public-facing portals or intranets accessible by multiple users. Mitigation involves promptly applying patches once available, implementing strict input validation and output encoding, and employing Content Security Policy (CSP) headers to limit script execution. Countries with significant Adobe Experience Manager deployments, such as Germany, France, the UK, and the Netherlands, are more likely to be affected due to their large enterprise and public sector use of AEM.

AI-Powered Analysis

AILast updated: 12/17/2025, 21:04:10 UTC

Technical Analysis

CVE-2025-64822 is a stored Cross-Site Scripting (XSS) vulnerability identified in Adobe Experience Manager (AEM) versions 6.5.23 and earlier. This vulnerability arises from insufficient sanitization of user input in certain form fields, allowing a low-privileged attacker to inject malicious JavaScript code that is persistently stored on the server. When other users access the affected pages containing the injected scripts, the malicious code executes within their browsers under the context of the vulnerable AEM domain. This can lead to theft of session cookies, user credentials, or execution of unauthorized actions on behalf of the victim. The vulnerability requires the attacker to have low-level privileges to submit malicious input and requires victims to interact with the compromised content, such as visiting a page or submitting a form. The CVSS 3.1 base score of 5.4 reflects medium severity, with attack vector being network-based, low attack complexity, requiring privileges, and user interaction, and impacting confidentiality and integrity but not availability. No patches or exploit code are currently publicly available, but the vulnerability is officially published and should be addressed promptly. Adobe Experience Manager is widely used by enterprises and public sector organizations for managing web content, making this vulnerability a significant risk for organizations relying on AEM for customer-facing or internal portals. The stored XSS nature means the malicious payload can persist and affect multiple users over time, increasing the potential impact. The vulnerability is categorized under CWE-79, which is a common and well-understood web application security issue. Mitigation strategies include applying vendor patches when released, implementing robust input validation and output encoding, and deploying Content Security Policy (CSP) headers to restrict script execution. Monitoring and logging for suspicious input or behavior can help detect attempted exploitation.

Potential Impact

For European organizations, the impact of CVE-2025-64822 can be significant, particularly for those using Adobe Experience Manager to manage public-facing websites, intranets, or customer portals. Exploitation could lead to unauthorized disclosure of sensitive information such as session tokens or personal data, enabling attackers to impersonate users or escalate privileges. This can result in reputational damage, regulatory non-compliance (e.g., GDPR violations), and potential financial losses. The persistent nature of stored XSS increases the risk of widespread impact across multiple users. Since AEM is often used by government agencies, financial institutions, and large enterprises in Europe, the threat could affect critical services and sensitive data. The requirement for low privileges and user interaction lowers the barrier for exploitation, making it feasible for attackers to target less protected user accounts or social engineering campaigns. Although availability is not impacted, the compromise of confidentiality and integrity can disrupt trust and operational security. The absence of known exploits in the wild currently reduces immediate risk but does not eliminate the need for urgent remediation.

Mitigation Recommendations

1. Monitor Adobe’s official channels for patches addressing CVE-2025-64822 and apply them immediately upon release. 2. Implement strict input validation on all form fields to reject or sanitize potentially malicious scripts before storage. 3. Use context-aware output encoding to ensure that any user-supplied data rendered in web pages cannot execute as code. 4. Deploy Content Security Policy (CSP) headers to restrict the execution of inline scripts and limit sources of executable code. 5. Conduct regular security audits and penetration tests focusing on web application input handling and XSS vulnerabilities. 6. Educate developers and administrators on secure coding practices related to XSS prevention. 7. Enable comprehensive logging and monitoring to detect unusual input patterns or script execution attempts. 8. Limit user privileges to the minimum necessary to reduce the attack surface for low-privileged attackers. 9. Consider implementing web application firewalls (WAF) with rules tuned to detect and block XSS payloads targeting AEM. 10. Review and harden authentication and session management controls to mitigate the impact of stolen credentials or session tokens.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
adobe
Date Reserved
2025-11-11T22:48:38.830Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6939bdb5fe7b3954b690be89

Added to database: 12/10/2025, 6:36:37 PM

Last enriched: 12/17/2025, 9:04:10 PM

Last updated: 2/7/2026, 2:44:53 AM

Views: 51

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats