Description
Adobe Experience Manager versions 6.5.23 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low-privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field.
Published: 2026-03-11
Score: 5.4 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Cross-site Scripting (DOM-based XSS)
Action: Patch Now
AI Analysis

Impact

Adobe Experience Manager versions 6.5.23 and earlier contain a stored cross‑site scripting vulnerability that allows a low‑privileged attacker to inject malicious JavaScript into vulnerable form fields; when a victim visits the affected page the script executes in the victim’s browser. This can lead to the theft or manipulation of user data, credential hijacking, or other malicious actions performed under the victim’s identity.

Affected Systems

The vulnerability affects Adobe Experience Manager, specifically releases 6.5.23 and earlier. The associated CPE identifiers indicate the packaging for the 6.5 LTS releases and the cloud service variant. No newer versions are listed as affected.

Risk and Exploitability

The CVSS base score of 5.4 indicates moderate severity, and the EPSS score of less than 1% suggests a low probability of widespread exploitation at this time. The vulnerability is not listed in the CISA KEV catalog. Exploitation requires only that an attacker be able to submit data to a vulnerable form field, which can be achieved with very low privileges; the victim must then visit the page containing the stored script for the payload to execute.

Generated by OpenCVE AI on March 17, 2026 at 15:35 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the patch provided by Adobe by upgrading AEM to version 6.5.24 or later as outlined in the Adobe security advisory.
  • If patching immediately is not feasible, sanitize or whitelist input for the affected form fields to prevent script injection, or disable the fields entirely.
  • Follow the detailed upgrade instructions available at https://helpx.adobe.com/security/products/experience-manager/apsb26-24.html for a step‑by‑step remediation approach.

Generated by OpenCVE AI on March 17, 2026 at 15:35 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 11 Mar 2026 14:45:00 +0000

Type Values Removed Values Added
First Time appeared Adobe experience Manager
CPEs cpe:2.3:a:adobe:experience_manager:*:*:*:*:-:*:*:*
cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*
cpe:2.3:a:adobe:experience_manager:6.5:-:*:*:lts:*:*:*
cpe:2.3:a:adobe:experience_manager:6.5:sp1:*:*:lts:*:*:*
Vendors & Products Adobe experience Manager

Wed, 11 Mar 2026 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 11 Mar 2026 12:00:00 +0000

Type Values Removed Values Added
First Time appeared Adobe
Adobe adobe Experience Manager
Vendors & Products Adobe
Adobe adobe Experience Manager

Wed, 11 Mar 2026 01:00:00 +0000

Type Values Removed Values Added
Description Adobe Experience Manager versions 6.5.23 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low-privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field.
Title Adobe Experience Manager | Cross-site Scripting (DOM-based XSS) (CWE-79)
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 5.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}


Subscriptions

Adobe Adobe Experience Manager Experience Manager
cve-icon MITRE

Status: PUBLISHED

Assigner: adobe

Published:

Updated: 2026-03-11T13:38:39.651Z

Reserved: 2026-02-18T22:02:41.383Z

Link: CVE-2026-27247

cve-icon Vulnrichment

Updated: 2026-03-11T13:29:31.387Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-11T01:16:54.693

Modified: 2026-03-11T15:20:18.430

Link: CVE-2026-27247

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-20T14:38:31Z

Weaknesses