Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-64872: Cross-site Scripting (Stored XSS) (CWE-79) in Adobe Adobe Experience Manager

0
Medium
VulnerabilityCVE-2025-64872cvecve-2025-64872cwe-79
Published: Wed Dec 10 2025 (12/10/2025, 18:22:53 UTC)
Source: CVE Database V5
Vendor/Project: Adobe
Product: Adobe Experience Manager

Description

Adobe Experience Manager versions 6.5.23 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a high privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field.

AI-Powered Analysis

AILast updated: 12/17/2025, 19:51:44 UTC

Technical Analysis

CVE-2025-64872 is a stored Cross-Site Scripting (XSS) vulnerability identified in Adobe Experience Manager (AEM), specifically affecting versions 6.5.23 and earlier. Stored XSS occurs when malicious scripts are permanently stored on the target server, such as within form fields, and then served to users without proper sanitization. In this case, a high privileged attacker—such as an administrator or content editor with elevated rights—can inject malicious JavaScript code into vulnerable form fields within AEM. When other users browse pages containing these fields, the injected script executes in their browsers, potentially allowing the attacker to steal session cookies, perform actions on behalf of the victim, or manipulate page content. The vulnerability has a CVSS 3.1 base score of 4.8, reflecting medium severity, with the vector indicating network attack vector (AV:N), low attack complexity (AC:L), high privileges required (PR:H), user interaction required (UI:R), and a scope change (S:C). The impact affects confidentiality and integrity to a limited extent but does not affect availability. No public exploits have been reported yet, but the vulnerability is published and should be addressed promptly. The lack of available patches at the time of reporting necessitates interim mitigations. Given AEM's widespread use in enterprise content management, this vulnerability poses a risk to organizations relying on it for web content delivery and internal portals.

Potential Impact

For European organizations, the impact of CVE-2025-64872 can be significant, particularly for those using Adobe Experience Manager to manage public-facing websites or internal portals. Exploitation could lead to unauthorized disclosure of sensitive information such as session tokens or user data, enabling attackers to impersonate users or escalate privileges. This can result in data breaches, defacement of web content, or unauthorized actions performed under the victim's identity, undermining trust and potentially violating data protection regulations like GDPR. Although the vulnerability requires high privileges and user interaction, insider threats or compromised administrative accounts could facilitate exploitation. The scope of affected systems includes any European enterprise or public sector entity using vulnerable AEM versions, especially those in sectors like finance, government, healthcare, and media, where AEM is prevalent. The medium severity score indicates moderate risk, but the potential for chained attacks or targeted exploitation against high-value assets elevates the concern.

Mitigation Recommendations

To mitigate CVE-2025-64872, European organizations should first verify their Adobe Experience Manager version and plan immediate upgrades to a patched version once available. Until patches are released, restrict high privilege access to trusted personnel only and enforce strong authentication and session management controls. Implement rigorous input validation and output encoding on all form fields to prevent script injection. Deploy Content Security Policy (CSP) headers to limit the execution of unauthorized scripts in browsers. Monitor logs and user activity for unusual behavior indicative of XSS exploitation attempts. Conduct security awareness training for administrators and users to recognize suspicious content or behavior. Additionally, consider isolating AEM administrative interfaces from public networks and employing web application firewalls (WAFs) with rules tuned to detect and block XSS payloads. Regular security assessments and penetration testing focused on AEM deployments can help identify residual risks.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
adobe
Date Reserved
2025-11-11T22:48:38.844Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6939bdb8fe7b3954b690beda

Added to database: 12/10/2025, 6:36:40 PM

Last enriched: 12/17/2025, 7:51:44 PM

Last updated: 2/5/2026, 8:15:54 AM

Views: 26

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats