CVE-2025-64887

5.4 MEDIUM

📋 TL;DR

This DOM-based XSS vulnerability in Adobe Experience Manager allows low-privileged attackers to execute malicious JavaScript in victims' browsers when users interact with crafted URLs or manipulated pages. It affects AEM versions 6.5.23 and earlier, requiring user interaction for successful exploitation.

💻 Affected Systems

Products:
  • Adobe Experience Manager
Versions: 6.5.23 and earlier
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: Requires low-privileged attacker access and user interaction via crafted URL or manipulated page.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attacker steals session cookies, performs actions as the victim, or redirects to malicious sites, potentially leading to account compromise or data theft.

🟠

Likely Case

Session hijacking, defacement of user interface elements, or credential theft through phishing-like attacks.

🟢

If Mitigated

Limited impact due to same-origin policy restrictions and requirement for user interaction, with proper input validation preventing exploitation.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires low-privileged attacker access and user interaction, making automated attacks difficult.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 6.5.24 or later

Vendor Advisory: https://helpx.adobe.com/security/products/experience-manager/apsb25-115.html

Restart Required: Yes

Instructions:

1. Download AEM 6.5.24 or later from Adobe distribution. 2. Backup current installation. 3. Apply the update following Adobe's upgrade documentation. 4. Restart AEM services.

🔧 Temporary Workarounds

Input Validation Filter

all

Implement custom servlet filters to sanitize user input and prevent XSS payloads.

Implement Java servlet filter with OWASP Java Encoder library for output encoding

Content Security Policy

all

Deploy strict CSP headers to limit script execution sources.

Add 'Content-Security-Policy: script-src 'self'' to HTTP responses

🧯 If You Can't Patch

  • Implement web application firewall with XSS protection rules
  • Restrict low-privileged user access to AEM authoring interfaces

🔍 How to Verify

Check if Vulnerable:

Check AEM version via CRXDE Lite or system/console/status-productinfo endpoint

Check Version:

curl -u admin:password http://localhost:4502/system/console/status-productinfo | grep 'Adobe Experience Manager'

Verify Fix Applied:

Verify version is 6.5.24 or later and test XSS payloads are properly sanitized

📡 Detection & Monitoring

Log Indicators:

  • Unusual JavaScript payloads in request logs
  • Multiple failed login attempts from single IP

Network Indicators:

  • Requests with suspicious script tags or JavaScript in parameters

SIEM Query:

source="aem-access.log" AND ("<script>" OR "javascript:" OR "onerror=" OR "onload=")

🔗 References

📤 Share & Export