Description
Adobe Experience Manager versions 6.5.23 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by an attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field.
Published: 2026-03-11
Score: 5.4 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Stored Cross‑Site Scripting
Action: Assess Impact
AI Analysis

Impact

Adobe Experience Manager versions 6.5.23 and earlier are vulnerable to a stored cross‑site scripting (XSS) flaw. An attacker may inject malicious JavaScript into vulnerable form fields, and the script is executed in the victim’s browser when the page is viewed. This type of vulnerability is classified as CWE‑79 and represents an input validation weakness that can lead to arbitrary code execution.

Affected Systems

The affected products are all Adobe Experience Manager 6.5 releases that are 6.5.23 or earlier, including the 6.5 LTS editions and the cloud service variant. The CPE entries show impact on cpe:2.3:a:adobe:experience_manager:6.5:-:*:*:lts:*:*:* and its SP1 variant, as well as generic Experience Manager and cloud service identifiers. No other products are listed.

Risk and Exploitability

The CVSS score of 5.4 indicates moderate severity. The EPSS score is below 1%, suggesting a low likelihood of exploitation, and the vulnerability is not listed in the CISA KEV catalog. Exploitation requires the attacker to submit content containing a script to a vulnerable form field; the stored script is then executed for any user who views the page. The attack vector is likely web‑based, requiring the attacker to manipulate content submitted to the system.

Generated by OpenCVE AI on March 17, 2026 at 17:12 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Check Adobe’s official security advisories for any available patches or updates for Experience Manager 6.5.
  • Restrict or remove editing permissions for content editors on the vulnerable form fields, or sanitize user input before rendering to eliminate stored scripts.
  • Implement a Content Security Policy that blocks inline script execution to reduce the impact of any remaining XSS content.

Generated by OpenCVE AI on March 17, 2026 at 17:12 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 11 Mar 2026 15:15:00 +0000

Type Values Removed Values Added
First Time appeared Adobe experience Manager
CPEs cpe:2.3:a:adobe:experience_manager:*:*:*:*:-:*:*:*
cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*
cpe:2.3:a:adobe:experience_manager:6.5:-:*:*:lts:*:*:*
cpe:2.3:a:adobe:experience_manager:6.5:sp1:*:*:lts:*:*:*
Vendors & Products Adobe experience Manager

Wed, 11 Mar 2026 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 11 Mar 2026 12:00:00 +0000

Type Values Removed Values Added
First Time appeared Adobe
Adobe adobe Experience Manager
Vendors & Products Adobe
Adobe adobe Experience Manager

Wed, 11 Mar 2026 01:00:00 +0000

Type Values Removed Values Added
Description Adobe Experience Manager versions 6.5.23 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by an attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field.
Title Adobe Experience Manager | Cross-site Scripting (Stored XSS) (CWE-79)
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 5.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}


Subscriptions

Adobe Adobe Experience Manager Experience Manager
cve-icon MITRE

Status: PUBLISHED

Assigner: adobe

Published:

Updated: 2026-03-11T13:38:38.792Z

Reserved: 2026-02-18T22:02:41.380Z

Link: CVE-2026-27223

cve-icon Vulnrichment

Updated: 2026-03-11T13:29:10.943Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-11T01:16:51.440

Modified: 2026-03-11T15:14:15.330

Link: CVE-2026-27223

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-20T14:38:28Z

Weaknesses