CVE-2025-64861: Cross-site Scripting (Stored XSS) (CWE-79) in Adobe Adobe Experience Manager
CVE-2025-64861 is a stored Cross-Site Scripting (XSS) vulnerability affecting Adobe Experience Manager (AEM) versions 6. 5. 23 and earlier. A low-privileged attacker can inject malicious JavaScript into vulnerable form fields, which executes in the browsers of users who visit the affected pages. This vulnerability requires user interaction to trigger and can compromise confidentiality and integrity by stealing session tokens or manipulating page content. The CVSS score is 5. 4 (medium severity), reflecting the need for some privileges and user interaction. No known exploits are currently reported in the wild. European organizations using AEM for content management and digital experience delivery are at risk, especially those with public-facing portals. Mitigation involves applying patches when available, implementing strict input validation and output encoding, and employing Content Security Policy (CSP) headers.
AI Analysis
Technical Summary
CVE-2025-64861 is a stored Cross-Site Scripting (XSS) vulnerability identified in Adobe Experience Manager (AEM) versions 6.5.23 and earlier. The vulnerability arises from insufficient sanitization of user-supplied input in certain form fields, allowing a low-privileged attacker to inject malicious JavaScript code that is stored on the server. When a victim user accesses the affected page, the malicious script executes within their browser context, potentially leading to session hijacking, credential theft, or unauthorized actions performed on behalf of the user. The vulnerability is classified under CWE-79 and has a CVSS 3.1 base score of 5.4, indicating medium severity. The attack vector is network-based (remote), with low attack complexity and requiring low privileges but necessitating user interaction to trigger the payload. The scope is changed, meaning the vulnerability can affect resources beyond the vulnerable component. Currently, no public exploits or active exploitation in the wild have been reported. Adobe has not yet released a patch, but organizations are advised to monitor for updates. The vulnerability poses a significant risk to organizations relying on AEM for web content management, especially those with public-facing applications where attackers can submit malicious inputs. Stored XSS vulnerabilities are particularly dangerous because the malicious payload persists and can affect multiple users over time.
Potential Impact
For European organizations, this vulnerability can lead to unauthorized disclosure of sensitive information, such as session cookies or personal data, through malicious script execution. It can also enable attackers to perform actions on behalf of authenticated users, potentially leading to data manipulation or defacement of web content. Organizations in sectors like government, finance, and e-commerce that use Adobe Experience Manager for digital services could face reputational damage, regulatory penalties under GDPR for data breaches, and operational disruptions. The persistent nature of stored XSS increases the risk of widespread impact across user bases. Since the vulnerability requires user interaction, phishing or social engineering campaigns could be used to lure victims to vulnerable pages. The medium CVSS score reflects moderate risk but should not lead to complacency given the potential for chained attacks or privilege escalation.
Mitigation Recommendations
1. Monitor Adobe security advisories closely and apply official patches or updates as soon as they become available. 2. Implement strict input validation on all form fields to reject or sanitize potentially malicious input before storage. 3. Employ robust output encoding/escaping techniques to ensure that user-supplied data is safely rendered in HTML contexts. 4. Deploy Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts and reduce the impact of XSS attacks. 5. Conduct regular security testing, including automated scanning and manual code reviews, focusing on input handling in AEM components. 6. Educate users and administrators about the risks of phishing and social engineering that could exploit this vulnerability. 7. Consider implementing Web Application Firewalls (WAFs) with rules designed to detect and block XSS payloads targeting AEM. 8. Limit privileges of users who can submit content to reduce the attack surface. 9. Review and harden AEM configurations to minimize exposure of vulnerable components.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain
CVE-2025-64861: Cross-site Scripting (Stored XSS) (CWE-79) in Adobe Adobe Experience Manager
Description
CVE-2025-64861 is a stored Cross-Site Scripting (XSS) vulnerability affecting Adobe Experience Manager (AEM) versions 6. 5. 23 and earlier. A low-privileged attacker can inject malicious JavaScript into vulnerable form fields, which executes in the browsers of users who visit the affected pages. This vulnerability requires user interaction to trigger and can compromise confidentiality and integrity by stealing session tokens or manipulating page content. The CVSS score is 5. 4 (medium severity), reflecting the need for some privileges and user interaction. No known exploits are currently reported in the wild. European organizations using AEM for content management and digital experience delivery are at risk, especially those with public-facing portals. Mitigation involves applying patches when available, implementing strict input validation and output encoding, and employing Content Security Policy (CSP) headers.
AI-Powered Analysis
Technical Analysis
CVE-2025-64861 is a stored Cross-Site Scripting (XSS) vulnerability identified in Adobe Experience Manager (AEM) versions 6.5.23 and earlier. The vulnerability arises from insufficient sanitization of user-supplied input in certain form fields, allowing a low-privileged attacker to inject malicious JavaScript code that is stored on the server. When a victim user accesses the affected page, the malicious script executes within their browser context, potentially leading to session hijacking, credential theft, or unauthorized actions performed on behalf of the user. The vulnerability is classified under CWE-79 and has a CVSS 3.1 base score of 5.4, indicating medium severity. The attack vector is network-based (remote), with low attack complexity and requiring low privileges but necessitating user interaction to trigger the payload. The scope is changed, meaning the vulnerability can affect resources beyond the vulnerable component. Currently, no public exploits or active exploitation in the wild have been reported. Adobe has not yet released a patch, but organizations are advised to monitor for updates. The vulnerability poses a significant risk to organizations relying on AEM for web content management, especially those with public-facing applications where attackers can submit malicious inputs. Stored XSS vulnerabilities are particularly dangerous because the malicious payload persists and can affect multiple users over time.
Potential Impact
For European organizations, this vulnerability can lead to unauthorized disclosure of sensitive information, such as session cookies or personal data, through malicious script execution. It can also enable attackers to perform actions on behalf of authenticated users, potentially leading to data manipulation or defacement of web content. Organizations in sectors like government, finance, and e-commerce that use Adobe Experience Manager for digital services could face reputational damage, regulatory penalties under GDPR for data breaches, and operational disruptions. The persistent nature of stored XSS increases the risk of widespread impact across user bases. Since the vulnerability requires user interaction, phishing or social engineering campaigns could be used to lure victims to vulnerable pages. The medium CVSS score reflects moderate risk but should not lead to complacency given the potential for chained attacks or privilege escalation.
Mitigation Recommendations
1. Monitor Adobe security advisories closely and apply official patches or updates as soon as they become available. 2. Implement strict input validation on all form fields to reject or sanitize potentially malicious input before storage. 3. Employ robust output encoding/escaping techniques to ensure that user-supplied data is safely rendered in HTML contexts. 4. Deploy Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts and reduce the impact of XSS attacks. 5. Conduct regular security testing, including automated scanning and manual code reviews, focusing on input handling in AEM components. 6. Educate users and administrators about the risks of phishing and social engineering that could exploit this vulnerability. 7. Consider implementing Web Application Firewalls (WAFs) with rules designed to detect and block XSS payloads targeting AEM. 8. Limit privileges of users who can submit content to reduce the attack surface. 9. Review and harden AEM configurations to minimize exposure of vulnerable components.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- adobe
- Date Reserved
- 2025-11-11T22:48:38.842Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6939bdb6fe7b3954b690bec6
Added to database: 12/10/2025, 6:36:38 PM
Last enriched: 12/17/2025, 8:58:25 PM
Last updated: 2/7/2026, 6:33:15 PM
Views: 25
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2106: Improper Authorization in yeqifu warehouse
MediumCVE-2026-2105: Improper Authorization in yeqifu warehouse
MediumCVE-2026-2090: SQL Injection in SourceCodester Online Class Record System
MediumCVE-2026-2089: SQL Injection in SourceCodester Online Class Record System
MediumCVE-2026-2088: SQL Injection in PHPGurukul Beauty Parlour Management System
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.