Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-64887: Cross-site Scripting (DOM-based XSS) (CWE-79) in Adobe Adobe Experience Manager

0
Medium
VulnerabilityCVE-2025-64887cvecve-2025-64887cwe-79
Published: Wed Dec 10 2025 (12/10/2025, 18:24:13 UTC)
Source: CVE Database V5
Vendor/Project: Adobe
Product: Adobe Experience Manager

Description

CVE-2025-64887 is a DOM-based Cross-Site Scripting (XSS) vulnerability affecting Adobe Experience Manager (AEM) versions 6. 5. 23 and earlier. This vulnerability allows a low-privileged attacker to execute malicious scripts in the context of a victim's browser by tricking the user into visiting a crafted URL or interacting with a manipulated web page. Exploitation requires user interaction and does not directly impact system availability but can compromise confidentiality and integrity of user data. The vulnerability has a CVSS score of 5. 4, indicating medium severity. There are no known exploits in the wild currently, and no patches have been linked yet. European organizations using AEM, especially in countries with high adoption of Adobe products in government, finance, and media sectors, should be vigilant. Mitigation involves applying updates once available, implementing strict input validation and Content Security Policies (CSP), and educating users about phishing risks.

AI-Powered Analysis

AILast updated: 12/17/2025, 20:57:08 UTC

Technical Analysis

CVE-2025-64887 is a DOM-based Cross-Site Scripting (XSS) vulnerability identified in Adobe Experience Manager (AEM) versions 6.5.23 and earlier. This vulnerability arises from improper handling of untrusted data within the Document Object Model (DOM) in the web application, allowing an attacker to inject malicious scripts that execute in the context of a victim's browser. The attack vector requires the victim to interact with a crafted URL or manipulated web page, making social engineering or phishing a likely exploitation method. The vulnerability is classified under CWE-79, which pertains to Cross-Site Scripting issues. The CVSS v3.1 base score is 5.4, reflecting a medium severity level, with the vector indicating network attack vector (AV:N), low attack complexity (AC:L), requiring low privileges (PR:L), user interaction (UI:R), and a scope change (S:C). The impact affects confidentiality and integrity but not availability. No known exploits have been reported in the wild, and no official patches have been linked at the time of publication. AEM is widely used in enterprise content management, digital asset management, and web content delivery, making this vulnerability significant for organizations relying on Adobe's platform for critical web services. The DOM-based nature of the XSS means that the malicious payload is executed on the client side, potentially stealing session tokens, redirecting users, or performing unauthorized actions within the victim's browser session. Due to the requirement for user interaction, exploitation is less straightforward than reflected or stored XSS but remains a significant risk, especially in environments with high user traffic and sensitive data exposure.

Potential Impact

For European organizations, the impact of CVE-2025-64887 can be substantial, particularly for those using Adobe Experience Manager to deliver web content for government portals, financial institutions, healthcare providers, and media companies. Successful exploitation could lead to theft of session cookies, user credentials, or sensitive information accessible through the victim's browser session, undermining confidentiality and integrity. This could facilitate further attacks such as account takeover, unauthorized transactions, or data leakage. Although availability is not directly impacted, reputational damage and regulatory consequences under GDPR could be severe if personal data is compromised. The requirement for user interaction means phishing campaigns or social engineering tactics could be leveraged to exploit this vulnerability, increasing the risk in sectors with high user engagement. The widespread use of AEM in Europe’s public and private sectors amplifies the potential attack surface, making timely mitigation critical to prevent targeted attacks that could disrupt business operations or public services.

Mitigation Recommendations

1. Monitor Adobe’s official channels for patches or updates addressing CVE-2025-64887 and apply them promptly once available. 2. Implement strict Content Security Policies (CSP) to restrict the execution of untrusted scripts and reduce the impact of DOM-based XSS attacks. 3. Conduct thorough input validation and sanitization on all user-controllable inputs that interact with the DOM to prevent injection of malicious scripts. 4. Educate end users and administrators about the risks of phishing and social engineering attacks that could lead to exploitation via crafted URLs or manipulated web pages. 5. Employ web application firewalls (WAFs) with rules tuned to detect and block suspicious payloads or anomalous user interactions targeting AEM instances. 6. Regularly audit and review AEM configurations and custom code for insecure DOM manipulations or unsafe JavaScript practices. 7. Use browser security features such as HTTPOnly and Secure flags on cookies to limit script access to session tokens. 8. Implement multi-factor authentication (MFA) to reduce the impact of credential theft resulting from XSS exploitation. 9. Monitor logs and user behavior for signs of exploitation attempts or unusual activity related to AEM web applications.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
adobe
Date Reserved
2025-11-11T22:48:38.846Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6939bdb8fe7b3954b690bee6

Added to database: 12/10/2025, 6:36:40 PM

Last enriched: 12/17/2025, 8:57:08 PM

Last updated: 2/4/2026, 6:19:16 PM

Views: 85

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats