Article Details
Scrape Timestamp (UTC): 2025-08-05 19:02:42.442
Original Article Text
Click to Toggle View
Adobe issues emergency fixes for AEM Forms zero-days after PoCs released. Adobe released emergency updates for two zero-day flaws in Adobe Experience Manager (AEM) Forms on JEE after a PoC exploit chain was disclosed that can be used for unauthenticated, remote code execution on vulnerable instances. The flaws are tracked as CVE-2025-54253 and CVE-2025-54254: Adobe has fixed the flaws in the latest versions as described in this advisory. The vulnerabilities were discovered by Shubham Shah and Adam Kues of Searchlight Cyber, who disclosed them to Adobe on April 28, 2025, along with a third issue, CVE-2025-49533. Adobe initially patched CVE-2025-49533 on August 5, leaving the other two flaws unfixed for over 90 days. After warning Adobe of their disclosure timeline, the researchers published a technical write-up on July 29 detailing how the vulnerabilities work and how they can be exploited. According to the researchers, CVE-2025-49533 is a Java deserialization flaw in the FormServer module that allows unauthenticated remote code execution (RCE). A servlet processes user-supplied data by decoding and deserializing it without validation, letting attackers send malicious payloads to execute commands on the server. The XXE vulnerability, tracked as CVE-2025-54254, affects a web service that handles SOAP authentication. By submitting a specially crafted XML payload, attackers can trick the service into exposing local files, such as win.ini, without authentication. Finally, the CVE-2025-54253 flaw is caused by an authentication bypass in /adminui module in combination with a misconfigured developer setting. The researchers found that Struts2's development mode was left enabled by mistake, allowing attackers to execute OGNL expressions through debug parameters sent in HTTP requests. As the flaws allow remote code execution on vulnerable servers, all admins are advised to install the latest updates and hotfixes as soon as possible. If that is not possible, the researchers strongly recommend restricting access to the platform from the internet. Red Report 2025: Analyzing the Top ATT&CK Techniques Used by 93% of Malware Malware targeting password stores surged 3X as attackers executed stealthy Perfect Heist scenarios, infiltrating and exploiting critical systems. Discover the top 10 MITRE ATT&CK techniques behind 93% of attacks and how to defend against them.
Daily Brief Summary
Adobe issued urgent updates for two zero-day vulnerabilities in Adobe Experience Manager (AEM) Forms on JEE.
The vulnerabilities, CVE-2025-54253 and CVE-2025-54254, enable unauthenticated remote code execution on affected systems.
Researchers disclosed these flaws after Adobe delayed patches for over 90 days, prompting a public technical write-up.
CVE-2025-49533, a Java deserialization flaw, was patched earlier, allowing remote code execution through malicious payloads.
CVE-2025-54254 exploits a SOAP authentication service via crafted XML payloads to expose local files.
CVE-2025-54253 involves an authentication bypass due to a misconfigured developer setting in the /adminui module.
Administrators are urged to apply the latest updates immediately or restrict internet access to vulnerable platforms.