Adobe Security Bulletin

Security updates available for Adobe Experience Manager | APSB25-90

Bulletin ID

Date Published

Priority

APSB25-90

September 9, 2025

3

Summary

Adobe has released updates for Adobe Experience Manager (AEM). These updates resolve vulnerabilities rated critical and important. Successful exploitation of these vulnerabilities could result in security feature bypass.

Adobe is not aware of any exploits in the wild for any of the issues addressed in these updates.

Affected product versions

Product Version Platform
Adobe Experience Manager (AEM)
AEM Cloud Service (CS)
All

6.5 LTS SP1 and earlier versions

6.5.23 and earlier versions 

All

Solution

Adobe categorizes these updates with the following priority ratings and recommends users update their installation to the newest version:

Product

Version

Platform

Priority

Availability

Adobe Experience Manager (AEM) 
AEM Cloud Service Release 2025.9 All 3 Release Notes
Adobe Experience Manager (AEM)  6.5 LTS SP1 (GRANITE-61551 Hotfix) All  3 Release Notes
Adobe Experience Manager (AEM) 6.5.23 (GRANITE-61551 Hotfix) All  3 Release Notes
Note

Customers running on Adobe Experience Manager’s Cloud Service will automatically receive updates that include new features as well as security and functionality bug fixes.  

Note

Please contact Adobe customer care for assistance with AEM versions 6.4, 6.3 and 6.2.

Vulnerability Details

Vulnerability Category
Vulnerability Impact
Severity
CVSS base score
CVSS vector
CVE Number
Improper Input Validation (CWE-20) Security feature bypass Critical 7.7 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N CVE-2025-54248
Incorrect Authorization (CWE-863) Security feature bypass Important 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N CVE-2025-54246
Improper Input Validation (CWE-20) Security feature bypass Important 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N CVE-2025-54247
Server-Side Request Forgery (SSRF) (CWE-918) Security feature bypass Important 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N CVE-2025-54249
Improper Input Validation (CWE-20) Security feature bypass Important 4.9 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N CVE-2025-54250
XML Injection (aka Blind XPath Injection) (CWE-91) Security feature bypass Important 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N CVE-2025-54251
Cross-site Scripting (Stored XSS) (CWE-79) Security feature bypass Important 5.4 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N CVE-2025-54252
Note

If a customer is using Apache httpd in a proxy with a non-default configuration, they may be impacted by CVE-2023-25690 - please read more here: https://httpd.apache.org/security/vulnerabilities_24.html

Acknowledgments

Adobe would like to thank the following for reporting these issues and for working with Adobe to help protect our customers: 

  • Dylan Pindur and Adam Kues (Assetnote) - CVE-2025-54246, CVE-2025-54247, CVE-2025-54248, CVE-2025-54249, CVE-2025-54250, CVE-2025-54251, CVE-2025-54252

NOTE: Adobe has a public bug bounty program with HackerOne. If you are interested in working with Adobe as an external security researcher, please check out https://hackerone.com/adobe


For more information, visit https://helpx.adobe.com/security.html, or email PSIRT@adobe.com.

Adobe, Inc.

Get help faster and easier

New user?