Description
Adobe Connect versions 12.9 and earlier are affected by a DOM-based Cross-Site Scripting (XSS) vulnerability that could be exploited by a high-privileged attacker to execute malicious scripts in a victim's browser. Exploitation of this issue requires user interaction in that a victim must navigate to a crafted web page. A successful attacker can abuse this to achieve session takeover, increasing the confidentiality and integrity impact as high. Scope is changed.
Published: 2025-10-14
Score: 8.1 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

Adobe Connect versions 12.9 and earlier suffer from a DOM‑based Cross‑Site Scripting (XSS) flaw. The vulnerability allows an attacker with high privileges to embed malicious scripts that run in a victim’s browser when the victim visits a crafted web page. Successful exploitation can lead to session hijacking, and because the flaw changes application scope, it can compromise confidentiality and integrity at a high level.

Affected Systems

Affected systems are installations of Adobe Connect through version 12.9 on macOS and Windows platforms. The vulnerability is present in all builds before the release associated with Adobe's security bulletin APSB25‑70.

Risk and Exploitability

The CVSS score of 8.1 indicates a high severity. However, the EPSS of less than 1% suggests exploitation is unlikely under normal circumstances, and the flaw is not listed in CISA’s KEV catalog. Exploitation requires user interaction – the victim must open a specially crafted page – meaning the attack vector is browser‑based XSS. Because the vulnerability alters the application scope, it permits an attacker to gain elevated privileges within the Adobe Connect environment, potentially leading to session takeover and data compromise.

Generated by OpenCVE AI on May 1, 2026 at 06:14 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade to the latest Adobe Connect version that contains the fix as noted in Adobe's security bulletin APSB25‑70.
  • Implement a Content Security Policy that blocks execution of scripts from untrusted origins on the Adobe Connect interface.
  • Configure a web application firewall or filtering solution to detect and block typical XSS payloads targeting the Adobe Connect application.

Generated by OpenCVE AI on May 1, 2026 at 06:14 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 28 Apr 2026 02:00:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:N'}

cvssV3_1

{'score': 8.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:N'}


Fri, 17 Oct 2025 15:00:00 +0000

Type Values Removed Values Added
First Time appeared Adobe
Adobe connect
Apple
Apple macos
Microsoft
Microsoft windows
CPEs cpe:2.3:a:adobe:connect:*:*:*:*:*:-:*:*
cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*
Vendors & Products Adobe
Adobe connect
Apple
Apple macos
Microsoft
Microsoft windows

Wed, 15 Oct 2025 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 14 Oct 2025 22:00:00 +0000

Type Values Removed Values Added
Description Adobe Connect versions 12.9 and earlier are affected by a DOM-based Cross-Site Scripting (XSS) vulnerability that could be exploited by a high-privileged attacker to execute malicious scripts in a victim's browser. Exploitation of this issue requires user interaction in that a victim must navigate to a crafted web page. A successful attacker can abuse this to achieve session takeover, increasing the confidentiality and integrity impact as high. Scope is changed.
Title Adobe Connect | Cross-site Scripting (DOM-based XSS) (CWE-79)
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: adobe

Published:

Updated: 2026-04-28T01:44:51.391Z

Reserved: 2025-06-06T15:42:09.517Z

Link: CVE-2025-49552

cve-icon Vulnrichment

Updated: 2025-10-15T20:13:05.458Z

cve-icon NVD

Status : Analyzed

Published: 2025-10-14T22:15:37.153

Modified: 2026-04-28T15:39:36.813

Link: CVE-2025-49552

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-01T06:15:10Z

Weaknesses