CVE-2025-64803
📋 TL;DR
Adobe Experience Manager versions 6.5.23 and earlier contain a stored cross-site scripting vulnerability in form fields. Low-privileged attackers can inject malicious scripts that execute in victims' browsers when they visit compromised pages. This affects all users of vulnerable AEM instances.
💻 Affected Systems
- Adobe Experience Manager
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Attackers could steal session cookies, perform actions as authenticated users, redirect to malicious sites, or install malware via drive-by downloads.
Likely Case
Session hijacking, credential theft, or defacement of web pages through injected content.
If Mitigated
Limited impact with proper input validation, output encoding, and Content Security Policy in place.
🎯 Exploit Status
Exploitation requires authenticated low-privileged access to inject scripts into vulnerable form fields.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 6.5.24 or later
Vendor Advisory: https://helpx.adobe.com/security/products/experience-manager/apsb25-115.html
Restart Required: Yes
Instructions:
1. Download AEM 6.5.24 or later from Adobe's distribution portal. 2. Apply the service pack following Adobe's upgrade documentation. 3. Restart the AEM instance. 4. Verify the update was successful.
🔧 Temporary Workarounds
Implement Content Security Policy
allAdd CSP headers to restrict script execution from untrusted sources
Add 'Content-Security-Policy' header with appropriate directives to web server configuration
Input Validation and Output Encoding
allImplement server-side validation and proper output encoding for all user inputs
Configure AEM's XSS protection filters and implement custom validation where needed
🧯 If You Can't Patch
- Restrict low-privileged user access to form editing capabilities
- Implement web application firewall rules to detect and block XSS payloads
🔍 How to Verify
Check if Vulnerable:
Check AEM version via the welcome page or OSGi console. Versions 6.5.23 and earlier are vulnerable.
Check Version:
Navigate to /system/console/status-productinfo in AEM or check the welcome page
Verify Fix Applied:
Verify AEM version is 6.5.24 or later and test form fields with XSS payloads to confirm they're properly sanitized.
📡 Detection & Monitoring
Log Indicators:
- Unusual form submissions with script tags or JavaScript code
- Multiple failed XSS attempts in request logs
Network Indicators:
- HTTP requests containing script injection patterns to form endpoints
SIEM Query:
source="aem_logs" AND ("<script>" OR "javascript:" OR "onerror=" OR "onload=")