Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-27265: Cross-site Scripting (Stored XSS) (CWE-79) in Adobe Adobe Experience Manager

0
Medium
VulnerabilityCVE-2026-27265cvecve-2026-27265cwe-79
Published: Wed Mar 11 2026 (03/11/2026, 00:23:22 UTC)
Source: CVE Database V5
Vendor/Project: Adobe
Product: Adobe Experience Manager

Description

CVE-2026-27265 is a stored Cross-Site Scripting (XSS) vulnerability affecting Adobe Experience Manager (AEM) versions 6. 5. 23 and earlier. This flaw allows a low-privileged attacker to inject malicious JavaScript into vulnerable form fields, which executes in the browsers of users who visit the affected pages. The vulnerability requires some user interaction, such as visiting a crafted page, and involves a scope change due to the potential impact on multiple users. The CVSS score is 5. 4 (medium severity), reflecting limited confidentiality and integrity impacts but no availability impact. No known exploits are currently reported in the wild. Organizations using AEM for content management and web delivery should prioritize patching or mitigating this issue to prevent potential session hijacking, credential theft, or unauthorized actions performed via injected scripts. Countries with significant Adobe AEM deployments and critical digital infrastructure are at higher risk.

AI-Powered Analysis

AILast updated: 03/11/2026, 01:15:18 UTC

Technical Analysis

CVE-2026-27265 is a stored Cross-Site Scripting (XSS) vulnerability identified in Adobe Experience Manager (AEM) versions 6.5.23 and earlier. Stored XSS occurs when malicious input is saved by the application and later rendered in users' browsers without proper sanitization or encoding. In this case, a low-privileged attacker can exploit vulnerable form fields to inject malicious JavaScript code that executes in the context of other users visiting the affected pages. This can lead to theft of session cookies, user impersonation, or execution of unauthorized actions on behalf of victims. The vulnerability has a CVSS 3.1 base score of 5.4, indicating medium severity, with the vector AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N. This means the attack can be performed remotely over the network with low attack complexity, requires low privileges, and user interaction (visiting the malicious page). The scope is changed because the vulnerability affects resources beyond the attacker’s privileges. Confidentiality and integrity impacts are limited but present, while availability is unaffected. No public exploits have been reported yet, but the risk remains significant due to the widespread use of AEM in enterprise content management and web delivery. Adobe has not yet published patches, so organizations must monitor for updates and apply them promptly once available. Until then, mitigating controls such as input validation, output encoding, and restricting form field inputs can reduce risk.

Potential Impact

The impact of CVE-2026-27265 on organizations worldwide can be significant, especially for those relying on Adobe Experience Manager for web content management and delivery. Successful exploitation allows attackers to execute arbitrary JavaScript in the browsers of users who visit compromised pages, potentially leading to session hijacking, credential theft, unauthorized actions, and defacement. This can result in data breaches, loss of user trust, reputational damage, and compliance violations. Because the vulnerability requires only low privileges to exploit and affects stored content, it can impact multiple users and systems across an organization. Attackers could leverage this to pivot into more sensitive systems or conduct phishing campaigns. Although no availability impact is expected, the confidentiality and integrity of user data and interactions are at risk. The medium CVSS score reflects these factors, but the real-world impact depends on the deployment context, user base, and existing security controls.

Mitigation Recommendations

To mitigate CVE-2026-27265 effectively, organizations should implement the following specific measures: 1) Apply Adobe's official patches immediately once they become available to address the root cause. 2) Until patches are released, enforce strict input validation on all form fields to reject or sanitize potentially malicious scripts. 3) Implement robust output encoding/escaping on all user-supplied content rendered in web pages to prevent script execution. 4) Use Content Security Policy (CSP) headers to restrict the execution of inline scripts and limit the sources of executable scripts. 5) Conduct regular security audits and penetration testing focused on XSS vulnerabilities in AEM deployments. 6) Educate content authors and administrators about the risks of injecting untrusted content. 7) Monitor web application logs and user reports for suspicious activity that may indicate exploitation attempts. 8) Restrict privileges of users who can submit content to minimize the attack surface. These steps go beyond generic advice by focusing on compensating controls and proactive detection until patches are applied.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
adobe
Date Reserved
2026-02-18T22:02:41.387Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69b0be8c2f860ef943f0dd9a

Added to database: 3/11/2026, 12:59:56 AM

Last enriched: 3/11/2026, 1:15:18 AM

Last updated: 3/11/2026, 2:11:49 AM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses