CVE-2025-64537
Published: 10 December 2025
Description
Adobe Experience Manager versions 6.5.23 and earlier are affected by a DOM-based Cross-Site Scripting (XSS) vulnerability that could lead to arbitrary code execution. An attacker could exploit this vulnerability by injecting malicious scripts into a web page that are executed…
more
in the context of the victim's browser. A successful attacker can abuse this to achieve session takeover, increasing the confidentiality and integrity impact as high. Exploitation of this issue requires user interaction in that a victim must visit a crafted malicious page.
Mitigating Controls (NIST 800-53 r5)AI
Directly mitigates the DOM-based XSS vulnerability by identifying, reporting, and applying patches as specified in Adobe's security bulletin for affected Experience Manager versions.
Prevents execution of injected malicious scripts by filtering and encoding dynamic content inserted into web pages, addressing the core DOM manipulation in this XSS flaw.
Blocks exploitation by validating and sanitizing untrusted inputs such as URL parameters used in client-side script processing for DOM-based attacks.
Security SummaryAI
CVE-2025-64537 is a DOM-based Cross-Site Scripting (XSS) vulnerability affecting Adobe Experience Manager versions 6.5.23 and earlier. This flaw, classified under CWE-79, allows attackers to inject malicious scripts into web pages that execute in the context of a victim's browser, potentially leading to arbitrary code execution. The vulnerability carries a CVSS v3.1 base score of 9.3 (AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N), reflecting its high severity due to network accessibility, low attack complexity, lack of required privileges, and elevated confidentiality and integrity impacts.
An unauthenticated attacker (PR:N) can exploit this issue by crafting a malicious web page that a victim must visit, requiring user interaction. Upon execution in the victim's browser, the injected scripts enable session takeover, compromising the confidentiality and integrity of the affected session with a changed scope (S:C).
Adobe has published Security Bulletin APSB25-115 detailing mitigation steps, available at https://helpx.adobe.com/security/products/experience-manager/apsb25-115.html. Security practitioners should consult this advisory for patch availability and recommended remediation actions for vulnerable Experience Manager deployments.
Details
- CWE(s)
Affected Products
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
DOM-based XSS in public-facing Adobe Experience Manager (T1190: Exploit Public-Facing Application) enables arbitrary script execution in victim browsers, facilitating session takeover via cookie theft (T1539: Steal Web Session Cookie).