Description
Adobe Experience Manager versions 6.5.23 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low-privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field.
Published: 2026-03-11
Score: 5.4 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Cross‑Site Scripting resulting in arbitrary JavaScript execution
Action: Patch
AI Analysis

Impact

This vulnerability allows a low‑privileged attacker to store malicious JavaScript in form fields of Adobe Experience Manager (AEM) versions 6.5.23 and earlier, resulting in arbitrary client‑side script execution when a victim views the affected page. Key detail from the vendor advisory: AEM stores the attacker‑supplied payload without proper sanitization, which triggers a stored Cross‑Site Scripting (XSS) flaw (CWE‑79). This can lead to data theft, session hijacking, or defacement of the website from the victim's browser.

Affected Systems

Affected products include Adobe Experience Manager 6.5.23 and all earlier releases of the 6.5 series. The vulnerability applies to both the standard edition and the AEM Cloud Service variant, as indicated by the Common Platform Enumeration identifiers provided by Adobe. Key detail from the vendor advisory confirms the 6.5.23 cutoff and lists these affected editions.

Risk and Exploitability

The assigned CVSS v3.1 score is 5.4, indicating medium severity; the EPSS score is less than 1%, suggesting a low probability of active exploitation, and the issue is not listed in the CISA Known Exploited Vulnerabilities catalog. The attack vector is low‑privilege (the attacker only needs the ability to submit form data), but the impact is client‑side and can be triggered by any user who views the malicious content. Key detail from the vendor advisory and the CVSS calculation confirm the level of risk. Reference: https://helpx.adobe.com/security/products/experience-manager/apsb26-24.html.

Generated by OpenCVE AI on March 17, 2026 at 16:44 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Adobe Experience Manager to any release newer than version 6.5.23.
  • Verify that form fields are properly sanitized and that no stored scripts remain.
  • Regularly monitor Adobe advisories for related updates.

Generated by OpenCVE AI on March 17, 2026 at 16:44 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 11 Mar 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 11 Mar 2026 14:30:00 +0000

Type Values Removed Values Added
First Time appeared Adobe experience Manager
CPEs cpe:2.3:a:adobe:experience_manager:*:*:*:*:-:*:*:*
cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*
cpe:2.3:a:adobe:experience_manager:6.5:-:*:*:lts:*:*:*
cpe:2.3:a:adobe:experience_manager:6.5:sp1:*:*:lts:*:*:*
Vendors & Products Adobe experience Manager

Wed, 11 Mar 2026 12:00:00 +0000

Type Values Removed Values Added
First Time appeared Adobe
Adobe adobe Experience Manager
Vendors & Products Adobe
Adobe adobe Experience Manager

Wed, 11 Mar 2026 01:00:00 +0000

Type Values Removed Values Added
Description Adobe Experience Manager versions 6.5.23 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low-privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field.
Title Adobe Experience Manager | Cross-site Scripting (Stored XSS) (CWE-79)
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 5.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}


Subscriptions

Adobe Adobe Experience Manager Experience Manager
cve-icon MITRE

Status: PUBLISHED

Assigner: adobe

Published:

Updated: 2026-03-11T13:38:43.214Z

Reserved: 2026-02-18T22:02:41.385Z

Link: CVE-2026-27253

cve-icon Vulnrichment

Updated: 2026-03-11T13:31:12.349Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-11T01:16:55.720

Modified: 2026-03-11T14:29:32.830

Link: CVE-2026-27253

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-20T14:33:38Z

Weaknesses