CVE-2025-64850: Cross-site Scripting (Stored XSS) (CWE-79) in Adobe Adobe Experience Manager
Adobe Experience Manager versions 6.5.23 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field.
AI Analysis
Technical Summary
CVE-2025-64850 is a stored Cross-Site Scripting (XSS) vulnerability identified in Adobe Experience Manager (AEM), specifically affecting versions 6.5.23 and earlier. The vulnerability arises from insufficient sanitization of user input in certain form fields, allowing a low-privileged attacker to inject malicious JavaScript code that is stored on the server and subsequently executed in the browsers of users who visit the compromised pages. This type of vulnerability falls under CWE-79, indicating improper neutralization of input during web page generation. The attack vector is network-based, requiring the attacker to submit crafted input through vulnerable forms, which then persist on the server. When a victim accesses the affected page, the malicious script executes in their browser context, potentially leading to session hijacking, theft of cookies or credentials, or unauthorized actions performed on behalf of the user. The vulnerability requires low privileges to exploit but does require user interaction (visiting the infected page). The CVSS 3.1 base score is 5.4, reflecting a medium severity level with low confidentiality and integrity impacts and no availability impact. The scope is changed (S:C), indicating that the vulnerability affects components beyond the initially vulnerable component. No patches or exploit code are currently publicly available, and no known exploits have been reported in the wild. Adobe Experience Manager is widely used by enterprises for managing digital content and websites, making this vulnerability significant for organizations relying on AEM for their web presence. Attackers could leverage this flaw to compromise user sessions or deface websites, impacting brand reputation and user trust.
Potential Impact
For European organizations, the impact of CVE-2025-64850 can be significant due to the widespread use of Adobe Experience Manager in enterprise web content management across sectors such as government, finance, retail, and media. Exploitation could lead to unauthorized access to user sessions, theft of sensitive information such as authentication tokens or personal data, and potential defacement or manipulation of public-facing websites. This can result in reputational damage, loss of customer trust, and regulatory compliance issues under GDPR if personal data is compromised. The vulnerability's requirement for user interaction and low privilege means that insider threats or external attackers with minimal access could exploit it. Additionally, the scope change indicates that the impact could extend beyond the initial vulnerable component, potentially affecting integrated systems or services. Given the digital transformation initiatives in Europe, many organizations rely heavily on AEM, increasing the potential attack surface. The absence of known exploits currently reduces immediate risk but does not eliminate the threat, especially as attackers often develop exploits rapidly after disclosure.
Mitigation Recommendations
1. Monitor Adobe's official channels for patches addressing CVE-2025-64850 and apply them promptly once released. 2. Implement strict input validation on all form fields to reject or sanitize potentially malicious scripts before storage. 3. Employ robust output encoding/escaping techniques when rendering user-supplied content to prevent script execution. 4. Deploy Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in browsers, limiting the impact of any injected code. 5. Conduct regular security audits and penetration testing focused on web application input handling and stored XSS vulnerabilities. 6. Educate developers and administrators on secure coding practices related to XSS prevention. 7. Limit privileges of users who can submit content to reduce the risk of malicious input. 8. Use web application firewalls (WAFs) configured to detect and block common XSS attack patterns targeting AEM. 9. Monitor logs and user activity for unusual behavior that may indicate exploitation attempts. 10. Consider isolating or sandboxing components that handle user-generated content to contain potential attacks.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden
CVE-2025-64850: Cross-site Scripting (Stored XSS) (CWE-79) in Adobe Adobe Experience Manager
Description
Adobe Experience Manager versions 6.5.23 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field.
AI-Powered Analysis
Technical Analysis
CVE-2025-64850 is a stored Cross-Site Scripting (XSS) vulnerability identified in Adobe Experience Manager (AEM), specifically affecting versions 6.5.23 and earlier. The vulnerability arises from insufficient sanitization of user input in certain form fields, allowing a low-privileged attacker to inject malicious JavaScript code that is stored on the server and subsequently executed in the browsers of users who visit the compromised pages. This type of vulnerability falls under CWE-79, indicating improper neutralization of input during web page generation. The attack vector is network-based, requiring the attacker to submit crafted input through vulnerable forms, which then persist on the server. When a victim accesses the affected page, the malicious script executes in their browser context, potentially leading to session hijacking, theft of cookies or credentials, or unauthorized actions performed on behalf of the user. The vulnerability requires low privileges to exploit but does require user interaction (visiting the infected page). The CVSS 3.1 base score is 5.4, reflecting a medium severity level with low confidentiality and integrity impacts and no availability impact. The scope is changed (S:C), indicating that the vulnerability affects components beyond the initially vulnerable component. No patches or exploit code are currently publicly available, and no known exploits have been reported in the wild. Adobe Experience Manager is widely used by enterprises for managing digital content and websites, making this vulnerability significant for organizations relying on AEM for their web presence. Attackers could leverage this flaw to compromise user sessions or deface websites, impacting brand reputation and user trust.
Potential Impact
For European organizations, the impact of CVE-2025-64850 can be significant due to the widespread use of Adobe Experience Manager in enterprise web content management across sectors such as government, finance, retail, and media. Exploitation could lead to unauthorized access to user sessions, theft of sensitive information such as authentication tokens or personal data, and potential defacement or manipulation of public-facing websites. This can result in reputational damage, loss of customer trust, and regulatory compliance issues under GDPR if personal data is compromised. The vulnerability's requirement for user interaction and low privilege means that insider threats or external attackers with minimal access could exploit it. Additionally, the scope change indicates that the impact could extend beyond the initial vulnerable component, potentially affecting integrated systems or services. Given the digital transformation initiatives in Europe, many organizations rely heavily on AEM, increasing the potential attack surface. The absence of known exploits currently reduces immediate risk but does not eliminate the threat, especially as attackers often develop exploits rapidly after disclosure.
Mitigation Recommendations
1. Monitor Adobe's official channels for patches addressing CVE-2025-64850 and apply them promptly once released. 2. Implement strict input validation on all form fields to reject or sanitize potentially malicious scripts before storage. 3. Employ robust output encoding/escaping techniques when rendering user-supplied content to prevent script execution. 4. Deploy Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in browsers, limiting the impact of any injected code. 5. Conduct regular security audits and penetration testing focused on web application input handling and stored XSS vulnerabilities. 6. Educate developers and administrators on secure coding practices related to XSS prevention. 7. Limit privileges of users who can submit content to reduce the risk of malicious input. 8. Use web application firewalls (WAFs) configured to detect and block common XSS attack patterns targeting AEM. 9. Monitor logs and user activity for unusual behavior that may indicate exploitation attempts. 10. Consider isolating or sandboxing components that handle user-generated content to contain potential attacks.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- adobe
- Date Reserved
- 2025-11-11T22:48:38.834Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6939bdb6fe7b3954b690beb7
Added to database: 12/10/2025, 6:36:38 PM
Last enriched: 12/10/2025, 6:55:15 PM
Last updated: 12/11/2025, 7:05:44 AM
Views: 4
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.