Description
Adobe Experience Manager versions 6.5.23 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by an attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field.
Published: 2026-03-11
Score: 5.4 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Stored Cross‑Site Script Execution
Action: Patch
AI Analysis

Impact

Adobe Experience Manager versions 6.5.23 and earlier contain a stored Cross‑Site Scripting (XSS) vulnerability. An attacker can place malicious JavaScript code into vulnerable form fields that are saved to the database. When a legitimate user views a page containing that field, the injected script is executed in the user’s browser, potentially enabling session hijacking, data theft, or other client‑side attacks. The weakness is identified as CWE‑79, a classic input validation failure that allows code injection.

Affected Systems

Affected products include Adobe Experience Manager and AEM Cloud Service. Specifically, any installation of AEM 6.5.23 or earlier is vulnerable. The CPE list cites cpe:2.3:a:adobe:experience_manager:6.5:-:*:*:lts:*:*:* and related cloud service entries. All impacted versions are those published before the patch that fixed the stored XSS issue.

Risk and Exploitability

The CVSS score of 5.4 denotes a moderate severity. EPSS indicates the probability of exploitation is low (<1 %). The vulnerability is not listed in the CISA KEV catalog. Attackers are likely to exploit the flaw by submitting malicious payloads through any accessible form field that is then rendered on a page viewable by other users. The attack vector is inferred from the stored XSS description, and no additional authentication is required to inject the payload.

Generated by OpenCVE AI on March 17, 2026 at 15:41 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest Adobe Experience Manager patch or upgrade to a version that addresses the stored XSS flaw.
  • Sanitize and validate all form input on the server side to eliminate injected script code.
  • Implement a Content Security Policy (CSP) to restrict execution of inline scripts in AEM-generated pages.
  • Audit and monitor form submissions for abnormal content to detect potential attack attempts.

Generated by OpenCVE AI on March 17, 2026 at 15:41 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 11 Mar 2026 15:15:00 +0000

Type Values Removed Values Added
First Time appeared Adobe experience Manager
CPEs cpe:2.3:a:adobe:experience_manager:*:*:*:*:-:*:*:*
cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*
cpe:2.3:a:adobe:experience_manager:6.5:-:*:*:lts:*:*:*
cpe:2.3:a:adobe:experience_manager:6.5:sp1:*:*:lts:*:*:*
Vendors & Products Adobe experience Manager
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 11 Mar 2026 12:00:00 +0000

Type Values Removed Values Added
First Time appeared Adobe
Adobe adobe Experience Manager
Vendors & Products Adobe
Adobe adobe Experience Manager

Wed, 11 Mar 2026 01:00:00 +0000

Type Values Removed Values Added
Description Adobe Experience Manager versions 6.5.23 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by an attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field.
Title Adobe Experience Manager | Cross-site Scripting (Stored XSS) (CWE-79)
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 5.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}


Subscriptions

Adobe Adobe Experience Manager Experience Manager
cve-icon MITRE

Status: PUBLISHED

Assigner: adobe

Published:

Updated: 2026-03-11T13:38:43.074Z

Reserved: 2026-02-18T22:02:41.381Z

Link: CVE-2026-27226

cve-icon Vulnrichment

Updated: 2026-03-11T13:31:09.143Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-11T01:16:51.967

Modified: 2026-03-11T15:12:48.060

Link: CVE-2026-27226

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-20T14:33:37Z

Weaknesses