Description
Adobe Experience Manager versions 6.5.23 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low-privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field.
Published: 2026-03-11
Score: 5.4 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Stored Cross‑Site Scripting (XSS)
Action: Patch Now
AI Analysis

Impact

Key detail from vendor description: 'Adobe Experience Manager versions 6.5.23 and earlier are affected by a stored Cross‑Site Scripting (XSS) vulnerability that could be abused by a low‑privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field.' The vulnerability is a stored XSS, defined by CWE‑79, that allows an attacker who can write to a form to store arbitrary JavaScript in the backend. When a victim loads the page that displays the stored data, the browser executes the injected code, which can compromise the victim’s confidentiality, integrity, or availability by stealing session cookies, credentials, or defacing the site.

Affected Systems

The affected product is Adobe Experience Manager. Versions 6.5.23 and all earlier releases are vulnerable, as specified in the vendor description. The Common Platform Enumeration list includes entries for 'cpe:2.3:a:adobe:experience_manager:6.5:-:*:*:lts:*:*:*' and the cloud service deployment, confirming that the issue applies to the base 6.5 package, the 6.5 Service Pack 1 build, and the cloud service. No specific patch version is mentioned in the input, so administrators should refer to Adobe’s security advisory for any patch releases.

Risk and Exploitability

The CVSS score of 5.4 indicates a medium severity flaw, while the EPSS score of <1% suggests a very low probability of exploitation in the wild. The vulnerability is not listed in CISA’s KEV catalog. Based on the description, it is inferred that the attack requires write access to a vulnerable form field, typically achievable by a low‑privileged user with form submission rights. Once the malicious script is stored, any user who loads the affected page is exposed, making the exploitation path straightforward but limited to users who view the page.

Generated by OpenCVE AI on March 17, 2026 at 16:44 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest Adobe Experience Manager patch that addresses CVE‑2026‑27250 (see the Adobe security advisory).
  • If a patch is not yet available, restrict or remove write access to the vulnerable form fields through AEM permission controls until remediation is applied.
  • Enable web application firewall rules or implement a Content Security Policy to block execution of unknown JavaScript sourced from form data.
  • Monitor application logs and user activity for unexpected script injections or session hijacking events.

Generated by OpenCVE AI on March 17, 2026 at 16:44 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 11 Mar 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 11 Mar 2026 14:45:00 +0000

Type Values Removed Values Added
First Time appeared Adobe experience Manager
CPEs cpe:2.3:a:adobe:experience_manager:*:*:*:*:-:*:*:*
cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*
cpe:2.3:a:adobe:experience_manager:6.5:-:*:*:lts:*:*:*
cpe:2.3:a:adobe:experience_manager:6.5:sp1:*:*:lts:*:*:*
Vendors & Products Adobe experience Manager

Wed, 11 Mar 2026 12:00:00 +0000

Type Values Removed Values Added
First Time appeared Adobe
Adobe adobe Experience Manager
Vendors & Products Adobe
Adobe adobe Experience Manager

Wed, 11 Mar 2026 01:00:00 +0000

Type Values Removed Values Added
Description Adobe Experience Manager versions 6.5.23 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low-privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field.
Title Adobe Experience Manager | Cross-site Scripting (Stored XSS) (CWE-79)
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 5.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}


Subscriptions

Adobe Adobe Experience Manager Experience Manager
cve-icon MITRE

Status: PUBLISHED

Assigner: adobe

Published:

Updated: 2026-03-11T13:38:43.510Z

Reserved: 2026-02-18T22:02:41.384Z

Link: CVE-2026-27250

cve-icon Vulnrichment

Updated: 2026-03-11T13:31:19.876Z

cve-icon NVD

Status : Undergoing Analysis

Published: 2026-03-11T01:16:55.207

Modified: 2026-03-11T14:30:51.827

Link: CVE-2026-27250

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-20T14:33:40Z

Weaknesses