Description
Adobe Experience Manager versions 6.5.23 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by an attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field.
Published: 2026-03-11
Score: 5.4 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Stored Cross‑Site Scripting
Action: Patch
AI Analysis

Impact

Adobe Experience Manager versions 6.5.23 and earlier are vulnerable to a stored Cross‑Site Scripting (XSS) flaw (CWE‑79). An attacker can inject malicious JavaScript into data that is stored in form fields; when a victim’s browser loads the affected page, the script executes, potentially enabling the attacker to hijack the user session or exfiltrate sensitive information.

Affected Systems

The affected product is Adobe Experience Manager from Adobe. All 6.5 releases—including the base 6.5, the LTS and SP1 variants, as well as the Cloud Service—are impacted. Any system running a version of the platform that is 6.5.23 or earlier is therefore at risk.

Risk and Exploitability

The CVSS base score of 5.4 indicates moderate severity. The EPSS score of less than 1% suggests a low likelihood of current exploitation, and the vulnerability is not listed in the CISA KEV catalog. Exploitation requires submission of malicious data to a vulnerable form field; the official description does not state whether authentication is required, so it is unclear if the attacker must be authenticated or can act as an unauthenticated user.

Generated by OpenCVE AI on March 17, 2026 at 17:53 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest Adobe Experience Manager release that addresses CVE-2026-27239, as detailed in Adobe's APSB26‑24 advisory.
  • If an upgrade cannot be performed immediately, disable or remove the vulnerable form fields to prevent script injection until a patch is available.
  • Implement strict input validation and output encoding on all form fields to mitigate XSS vulnerabilities.
  • Verify that any third‑party extensions or custom components follow secure coding practices and do not introduce additional XSS risks.
  • Monitor application logs and user activity for signs of script execution or anomalous input.

Generated by OpenCVE AI on March 17, 2026 at 17:53 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 11 Mar 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 11 Mar 2026 14:45:00 +0000

Type Values Removed Values Added
First Time appeared Adobe experience Manager
CPEs cpe:2.3:a:adobe:experience_manager:*:*:*:*:-:*:*:*
cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*
cpe:2.3:a:adobe:experience_manager:6.5:-:*:*:lts:*:*:*
cpe:2.3:a:adobe:experience_manager:6.5:sp1:*:*:lts:*:*:*
Vendors & Products Adobe experience Manager

Wed, 11 Mar 2026 12:00:00 +0000

Type Values Removed Values Added
First Time appeared Adobe
Adobe adobe Experience Manager
Vendors & Products Adobe
Adobe adobe Experience Manager

Wed, 11 Mar 2026 01:00:00 +0000

Type Values Removed Values Added
Description Adobe Experience Manager versions 6.5.23 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by an attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field.
Title Adobe Experience Manager | Cross-site Scripting (Stored XSS) (CWE-79)
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 5.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}


Subscriptions

Adobe Adobe Experience Manager Experience Manager
cve-icon MITRE

Status: PUBLISHED

Assigner: adobe

Published:

Updated: 2026-03-11T13:38:41.542Z

Reserved: 2026-02-18T22:02:41.382Z

Link: CVE-2026-27239

cve-icon Vulnrichment

Updated: 2026-03-11T13:30:27.190Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-11T01:16:53.827

Modified: 2026-03-11T15:17:49.980

Link: CVE-2026-27239

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-20T14:38:41Z

Weaknesses