CVE-2025-64537

9.3 CRITICAL

📋 TL;DR

Adobe Experience Manager versions 6.5.23 and earlier contain a DOM-based Cross-Site Scripting vulnerability that allows attackers to execute arbitrary JavaScript in victims' browsers. Successful exploitation can lead to session hijacking and account compromise. This affects all users of vulnerable AEM instances who visit malicious pages.

💻 Affected Systems

Products:
  • Adobe Experience Manager
Versions: 6.5.23 and earlier
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: All deployments of affected versions are vulnerable regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete account takeover leading to data theft, privilege escalation, and potential administrative control of the AEM instance.

🟠

Likely Case

Session hijacking allowing attackers to impersonate users, access sensitive content, and perform unauthorized actions within the application.

🟢

If Mitigated

Limited impact with proper Content Security Policy headers and input validation, though vulnerability remains present.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires user interaction (victim must visit malicious page) but no authentication to the AEM instance.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 6.5.24 or later

Vendor Advisory: https://helpx.adobe.com/security/products/experience-manager/apsb25-115.html

Restart Required: Yes

Instructions:

1. Download AEM 6.5.24 or later from Adobe's distribution portal. 2. Apply the service pack following Adobe's upgrade documentation. 3. Restart the AEM instance. 4. Verify the version is updated.

🔧 Temporary Workarounds

Implement Content Security Policy

all

Add strict CSP headers to prevent script execution from untrusted sources

Add 'Content-Security-Policy: script-src 'self'' to web server configuration

Input Validation Filter

all

Implement server-side validation for all user inputs

Configure AEM's XSS protection filters in /system/console/configMgr

🧯 If You Can't Patch

  • Implement web application firewall rules to block XSS payloads
  • Restrict access to AEM instance to trusted networks only

🔍 How to Verify

Check if Vulnerable:

Check AEM version via the welcome page or OSGi console. If version is 6.5.23 or earlier, the system is vulnerable.

Check Version:

curl -k https://aem-instance:4502/libs/granite/core/content/login.html | grep 'AEM 6.5'

Verify Fix Applied:

Verify AEM version is 6.5.24 or later and test XSS payloads are properly sanitized.

📡 Detection & Monitoring

Log Indicators:

  • Unusual JavaScript payloads in request logs
  • Multiple failed login attempts from same session

Network Indicators:

  • Suspicious JavaScript in HTTP requests
  • Requests containing common XSS payload patterns

SIEM Query:

source="aem_access.log" AND ("<script>" OR "javascript:" OR "onerror=" OR "onload=")

🔗 References

📤 Share & Export