CVE-2025-64802

5.4 MEDIUM

📋 TL;DR

Adobe Experience Manager versions 6.5.23 and earlier contain a stored Cross-Site Scripting vulnerability that allows low-privileged attackers to inject malicious JavaScript into form fields. When victims visit pages containing the compromised fields, their browsers execute the attacker's code, potentially leading to session hijacking or data theft.

💻 Affected Systems

Products:
  • Adobe Experience Manager
Versions: 6.5.23 and earlier
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: Requires low-privileged attacker access to vulnerable form fields; all deployments with affected versions are vulnerable by default.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could steal administrator sessions, compromise user accounts, deface websites, or redirect users to malicious sites, potentially leading to full system compromise if combined with other vulnerabilities.

🟠

Likely Case

Low-privileged attackers steal session cookies or credentials from users who interact with compromised form fields, enabling account takeover and lateral movement within the application.

🟢

If Mitigated

With proper input validation and output encoding, the vulnerability would be prevented, though residual risk remains if other XSS vectors exist.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated low-privileged access; stored XSS typically has low complexity once vulnerable fields are identified.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 6.5.24 or later

Vendor Advisory: https://helpx.adobe.com/security/products/experience-manager/apsb25-115.html

Restart Required: Yes

Instructions:

1. Download Adobe Experience Manager 6.5.24 or later from Adobe's official distribution channels. 2. Follow Adobe's upgrade documentation for your deployment type (on-premise or cloud). 3. Apply the update to all affected instances. 4. Restart the AEM service to complete the installation.

🔧 Temporary Workarounds

Input Validation Filter

all

Implement server-side input validation to sanitize user input in form fields before storage.

Configure AEM's XSS protection filter via OSGi configuration: /system/console/configMgr/com.adobe.granite.xss.impl.XSSFilterImpl

Content Security Policy

all

Implement strict Content Security Policy headers to mitigate script execution.

Add CSP headers via Apache/nginx configuration or AEM dispatcher rules

🧯 If You Can't Patch

  • Implement web application firewall rules to block XSS payloads in form submissions
  • Disable or restrict low-privileged user access to vulnerable form fields through permission controls

🔍 How to Verify

Check if Vulnerable:

Check AEM version via CRXDE Lite or system console; versions 6.5.23 or earlier are vulnerable.

Check Version:

curl -u admin:password http://localhost:4502/system/console/status-productinfo.json | grep 'Adobe Experience Manager'

Verify Fix Applied:

Verify installation of version 6.5.24 or later and test form fields with XSS payloads to confirm sanitization.

📡 Detection & Monitoring

Log Indicators:

  • Unusual form submissions containing script tags or JavaScript code in request parameters
  • Multiple failed XSS attempts from single IP addresses

Network Indicators:

  • HTTP requests with suspicious parameters containing <script> tags or JavaScript functions

SIEM Query:

source="aem_access.log" AND ("<script" OR "javascript:" OR "onerror=" OR "onload=")

🔗 References

📤 Share & Export