Description
Adobe Experience Manager versions 6.5.23 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low-privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field.
Published: 2026-03-11
Score: 5.4 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Stored Cross‑Site Scripting (XSS)
Action: Patch
AI Analysis

Impact

The vulnerability is a stored Cross‑Site Scripting (XSS) flaw in Adobe Experience Manager that allows a low‑privileged attacker to inject malicious JavaScript into form fields. Key detail from vendor description: 'Adobe Experience Manager versions 6.5.23 and earlier are affected by a stored Cross‑Site Scripting (XSS) vulnerability that could be abused by a low‑privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field.' The impact is execution of arbitrary script in the victim’s browser when they access the affected page, potentially leading to client‑side attacks such as phishing or defacement.

Affected Systems

Affected systems are Adobe Experience Manager versions 6.5.23 and earlier, including the long‑term support (LTS) releases 6.5 and 6.5 sp1 LTS. The CNA product list and associated CPE strings indicate the flaw exists across the generic AEM product, the AEM Cloud Service, and the specified LTS releases. No other vendors or products are listed as affected.

Risk and Exploitability

The CVSS score of 5.4 indicates moderate severity. The EPSS score is less than 1%, suggesting a low likelihood of exploitation in the wild. The vulnerability is not listed in CISA’s KEV catalog. Key detail from vendor description: the flaw requires an attacker to submit input to a vulnerable form field, meaning the attack vector is via user input. Because the injection is persisted, an attacker only needs a victim to visit a page containing the malicious script for execution to occur. No additional conditions are required beyond the presence of the vulnerable form field.

Generated by OpenCVE AI on March 17, 2026 at 16:42 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Download and apply the Adobe Experience Manager security patch for versions 6.5.23 and earlier, as provided in the PSB26‑24 advisory (https://helpx.adobe.com/security/products/experience-manager/apsb26-24.html).
  • If immediate patching cannot be performed, mitigate by implementing strict input validation or sanitization so that only safe content is accepted in the vulnerable form fields.
  • After applying mitigations, verify that previously injected scripts are no longer executable by testing with a benign script on affected pages.
  • Continue monitoring for indications of XSS exploitation and keep the system updated with any subsequent Adobe security releases.

Generated by OpenCVE AI on March 17, 2026 at 16:42 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 11 Mar 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 11 Mar 2026 14:30:00 +0000

Type Values Removed Values Added
First Time appeared Adobe experience Manager
CPEs cpe:2.3:a:adobe:experience_manager:*:*:*:*:-:*:*:*
cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*
cpe:2.3:a:adobe:experience_manager:6.5:-:*:*:lts:*:*:*
cpe:2.3:a:adobe:experience_manager:6.5:sp1:*:*:lts:*:*:*
Vendors & Products Adobe experience Manager

Wed, 11 Mar 2026 12:00:00 +0000

Type Values Removed Values Added
First Time appeared Adobe
Adobe adobe Experience Manager
Vendors & Products Adobe
Adobe adobe Experience Manager

Wed, 11 Mar 2026 01:00:00 +0000

Type Values Removed Values Added
Description Adobe Experience Manager versions 6.5.23 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low-privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field.
Title Adobe Experience Manager | Cross-site Scripting (Stored XSS) (CWE-79)
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 5.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}


Subscriptions

Adobe Adobe Experience Manager Experience Manager
cve-icon MITRE

Status: PUBLISHED

Assigner: adobe

Published:

Updated: 2026-03-11T13:38:42.613Z

Reserved: 2026-02-18T22:02:41.385Z

Link: CVE-2026-27254

cve-icon Vulnrichment

Updated: 2026-03-11T13:30:55.314Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-11T01:16:55.900

Modified: 2026-03-11T14:29:17.427

Link: CVE-2026-27254

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-20T14:33:34Z

Weaknesses