Adobe Experience Manager XSS

MEDIUM (5.4) No Patch (4 days)

Threat Intelligence

Low Risk
EPSS Score: 0.03% chance of exploitation (percentile: 8%)
🔍 Detection Tools: None available in major open-source tools
⚔️ Exploit Availability: No public exploits found

How we test →

What is it?

Adobe Experience Manager is a web content management system used by organizations to manage and publish their websites. This vulnerability allows attackers to execute malicious scripts in the context of a user's browser, potentially leading to unauthorized access to sensitive data or taking control of the user's session.

Am I affected?

Affected versions: 6.5.23 If you don't recognise this software, you're probably not affected.

Affected Packages

maven: org.apache.sling:core-jcr-2.5.1

Affected Products

Adobe Inc. / Adobe Experience Manager

How to fix

Upgrade to Adobe Experience Manager 6.5.24 or later.
Maven: Update the aem-core dependency in your pom.xml file.
Immediate mitigations:
- Restrict network access to your AEM instance (firewall it from the public internet)
- Audit admin account activity for suspicious access patterns
- Monitor for unauthorized token creation

References