Article Details
Scrape Timestamp (UTC): 2025-10-16 04:28:27.062
Source: https://thehackernews.com/2025/10/cisa-flags-adobe-aem-flaw-with-perfect.html
Original Article Text
Click to Toggle View
CISA Flags Adobe AEM Flaw with Perfect 10.0 Score — Already Under Active Attack. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Wednesday added a critical security flaw impacting Adobe Experience Manager to its Known Exploited Vulnerabilities (KEV) catalog, based on evidence of active exploitation. The vulnerability in question is CVE-2025-54253 (CVSS score: 10.0), a maximum-severity misconfiguration bug that could result in arbitrary code execution. According to Adobe, the shortcoming impacts Adobe Experience Manager (AEM) Forms on JEE versions 6.5.23.0 and earlier. It was addressed in version 6.5.0-0108 released early August 2025, alongside CVE-2025-54254 (CVSS score: 8.6). The flaw results from the dangerously exposed /adminui/debug servlet, which evaluates user-supplied OGNL expressions as Java code without requiring authentication or input validation," security company FireCompass noted. "The endpoint's misuse enables attackers to execute arbitrary system commands with a single crafted HTTP request." There is currently no information publicly available on how the security flaw is being exploited in real-world attacks, although Adobe acknowledged in its advisory that "CVE-2025-54253 and CVE-2025-54254 have a publicly available proof-of-concept." In light of active exploitation, Federal Civilian Executive Branch (FCEB) agencies are advised to apply the necessary fixes by November 5, 2025. The development comes a day after CISA also added a critical improper authentication vulnerability in SKYSEA Client View (CVE-2016-7836, CVSS score: 9.8) to the KEV catalog. Japan Vulnerability Notes (JVN), in an advisory released in late 2016, said "attacks exploiting this vulnerability have been observed in the wild." "SKYSEA Client View contains an improper authentication vulnerability that allows remote code execution via a flaw in processing authentication on the TCP connection with the management console program," the agency said.
Daily Brief Summary
CISA has added a critical Adobe Experience Manager (AEM) vulnerability, CVE-2025-54253, to its Known Exploited Vulnerabilities catalog due to active exploitation.
The flaw, with a CVSS score of 10.0, allows arbitrary code execution through a misconfigured servlet that evaluates user inputs as Java code.
Affected systems include Adobe AEM Forms on JEE versions 6.5.23.0 and earlier; a patch was released in August 2025 to address this issue.
The vulnerability is exploited via a crafted HTTP request, enabling attackers to execute system commands without authentication.
Federal agencies are required to apply the necessary patches by November 5, 2025, to mitigate potential risks.
The announcement follows the inclusion of another severe vulnerability in SKYSEA Client View, CVE-2016-7836, known for enabling remote code execution.
Organizations using affected Adobe AEM versions should prioritize patching to prevent unauthorized access and potential data breaches.