CVE-2025-64823: Cross-site Scripting (Stored XSS) (CWE-79) in Adobe Adobe Experience Manager
CVE-2025-64823 is a stored Cross-Site Scripting (XSS) vulnerability affecting Adobe Experience Manager (AEM) versions 6. 5. 23 and earlier. A low-privileged attacker can inject malicious JavaScript into vulnerable form fields, which executes in the browsers of users who visit the affected pages. This vulnerability requires user interaction and some privileges but no authentication bypass. The CVSS score is 5. 4 (medium severity), reflecting limited confidentiality and integrity impact but no availability impact. There are no known exploits in the wild yet. European organizations using AEM for content management and digital experience delivery are at risk, especially those with public-facing web portals. Mitigation involves applying patches when available, sanitizing and validating user inputs, and implementing Content Security Policy (CSP) headers.
AI Analysis
Technical Summary
CVE-2025-64823 is a stored Cross-Site Scripting (XSS) vulnerability identified in Adobe Experience Manager (AEM), a widely used enterprise content management system. The vulnerability exists in versions 6.5.23 and earlier, allowing an attacker with low privileges to inject malicious JavaScript code into vulnerable form fields within the application. When a victim user accesses a page containing the injected script, the malicious code executes in their browser context. This can lead to theft of session tokens, user impersonation, or unauthorized actions performed on behalf of the user. The vulnerability is classified under CWE-79, indicating improper neutralization of input during web page generation. The CVSS 3.1 base score is 5.4, with vector AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N, meaning the attack can be launched remotely over the network with low attack complexity, requires low privileges, and user interaction is necessary. The scope is changed (S:C), indicating the vulnerability affects resources beyond the vulnerable component. The impact on confidentiality and integrity is low, with no impact on availability. No public exploits have been reported yet, but the vulnerability poses a risk to any organization using affected AEM versions, especially those exposing forms to external users. The lack of patches at the time of reporting necessitates interim mitigations.
Potential Impact
For European organizations, this vulnerability can lead to unauthorized access to user sessions and potential data leakage through malicious script execution in user browsers. Organizations relying on Adobe Experience Manager for customer-facing websites or intranet portals may face risks of credential theft, session hijacking, or unauthorized actions performed by attackers impersonating legitimate users. This can damage organizational reputation, lead to regulatory non-compliance (e.g., GDPR breaches if personal data is compromised), and cause operational disruptions. The medium severity score reflects moderate risk, but the widespread use of AEM in Europe, especially in sectors like government, finance, and retail, increases the potential impact. Attackers exploiting this vulnerability could target employees or customers, leading to broader security incidents. The requirement for user interaction limits automated exploitation but does not eliminate risk, especially in phishing or social engineering scenarios.
Mitigation Recommendations
Organizations should prioritize upgrading Adobe Experience Manager to a version where this vulnerability is patched once available. Until patches are released, implement strict input validation and sanitization on all form fields to prevent script injection. Deploy Content Security Policy (CSP) headers to restrict execution of unauthorized scripts in browsers. Review and limit user privileges to minimize the ability of low-privileged users to inject malicious content. Conduct security awareness training to reduce the risk of users interacting with malicious content. Monitor web application logs for suspicious input patterns and anomalous user behavior. Consider deploying web application firewalls (WAF) with rules targeting XSS attack patterns specific to AEM. Regularly audit and test web applications for XSS vulnerabilities using automated scanners and manual penetration testing.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden
CVE-2025-64823: Cross-site Scripting (Stored XSS) (CWE-79) in Adobe Adobe Experience Manager
Description
CVE-2025-64823 is a stored Cross-Site Scripting (XSS) vulnerability affecting Adobe Experience Manager (AEM) versions 6. 5. 23 and earlier. A low-privileged attacker can inject malicious JavaScript into vulnerable form fields, which executes in the browsers of users who visit the affected pages. This vulnerability requires user interaction and some privileges but no authentication bypass. The CVSS score is 5. 4 (medium severity), reflecting limited confidentiality and integrity impact but no availability impact. There are no known exploits in the wild yet. European organizations using AEM for content management and digital experience delivery are at risk, especially those with public-facing web portals. Mitigation involves applying patches when available, sanitizing and validating user inputs, and implementing Content Security Policy (CSP) headers.
AI-Powered Analysis
Technical Analysis
CVE-2025-64823 is a stored Cross-Site Scripting (XSS) vulnerability identified in Adobe Experience Manager (AEM), a widely used enterprise content management system. The vulnerability exists in versions 6.5.23 and earlier, allowing an attacker with low privileges to inject malicious JavaScript code into vulnerable form fields within the application. When a victim user accesses a page containing the injected script, the malicious code executes in their browser context. This can lead to theft of session tokens, user impersonation, or unauthorized actions performed on behalf of the user. The vulnerability is classified under CWE-79, indicating improper neutralization of input during web page generation. The CVSS 3.1 base score is 5.4, with vector AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N, meaning the attack can be launched remotely over the network with low attack complexity, requires low privileges, and user interaction is necessary. The scope is changed (S:C), indicating the vulnerability affects resources beyond the vulnerable component. The impact on confidentiality and integrity is low, with no impact on availability. No public exploits have been reported yet, but the vulnerability poses a risk to any organization using affected AEM versions, especially those exposing forms to external users. The lack of patches at the time of reporting necessitates interim mitigations.
Potential Impact
For European organizations, this vulnerability can lead to unauthorized access to user sessions and potential data leakage through malicious script execution in user browsers. Organizations relying on Adobe Experience Manager for customer-facing websites or intranet portals may face risks of credential theft, session hijacking, or unauthorized actions performed by attackers impersonating legitimate users. This can damage organizational reputation, lead to regulatory non-compliance (e.g., GDPR breaches if personal data is compromised), and cause operational disruptions. The medium severity score reflects moderate risk, but the widespread use of AEM in Europe, especially in sectors like government, finance, and retail, increases the potential impact. Attackers exploiting this vulnerability could target employees or customers, leading to broader security incidents. The requirement for user interaction limits automated exploitation but does not eliminate risk, especially in phishing or social engineering scenarios.
Mitigation Recommendations
Organizations should prioritize upgrading Adobe Experience Manager to a version where this vulnerability is patched once available. Until patches are released, implement strict input validation and sanitization on all form fields to prevent script injection. Deploy Content Security Policy (CSP) headers to restrict execution of unauthorized scripts in browsers. Review and limit user privileges to minimize the ability of low-privileged users to inject malicious content. Conduct security awareness training to reduce the risk of users interacting with malicious content. Monitor web application logs for suspicious input patterns and anomalous user behavior. Consider deploying web application firewalls (WAF) with rules targeting XSS attack patterns specific to AEM. Regularly audit and test web applications for XSS vulnerabilities using automated scanners and manual penetration testing.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- adobe
- Date Reserved
- 2025-11-11T22:48:38.830Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6939bdb5fe7b3954b690be8c
Added to database: 12/10/2025, 6:36:37 PM
Last enriched: 12/17/2025, 9:02:27 PM
Last updated: 2/7/2026, 3:44:01 AM
Views: 45
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2071: Buffer Overflow in UTT 进取 520W
HighCVE-2026-25762: CWE-400: Uncontrolled Resource Consumption in adonisjs core
HighCVE-2026-25754: CWE-1321: Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') in adonisjs core
HighCVE-2026-25644: CWE-295: Improper Certificate Validation in datahub-project datahub
HighCVE-2026-25804: CWE-287: Improper Authentication in antrea-io antrea
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.