CVE-2025-54253
Adobe Experience Manager Code Execution Vulnerability
Description
Adobe Experience Manager versions 6.5.23 and earlier are affected by a Misconfiguration vulnerability that could result in arbitrary code execution. An attacker could leverage this vulnerability to bypass security mechanisms and execute code. Exploitation of this issue does not require user interaction and scope is changed.
INFO
Published Date :
Aug. 5, 2025, 5:15 p.m.
Last Modified :
Aug. 13, 2025, 6:56 p.m.
Remotely Exploit :
Yes !
Source :
[email protected]
Affected Products
The following products are affected by CVE-2025-54253
vulnerability.
Even if cvefeed.io
is aware of the exact versions of the
products
that
are
affected, the information is not represented in the table below.
CVSS Scores
Score | Version | Severity | Vector | Exploitability Score | Impact Score | Source |
---|---|---|---|---|---|---|
CVSS 3.1 | CRITICAL | [email protected] |
Solution
- Update Adobe Experience Manager to version 6.5.24 or later.
- Review Adobe's security advisories for specific configuration guidance.
- Apply security hardening best practices for AEM deployments.
Public PoC/Exploit Available at Github
CVE-2025-54253 has a 5 public
PoC/Exploit
available at Github.
Go to the Public Exploits
tab to see the list.
References to Advisories, Solutions, and Tools
Here, you will find a curated list of external links that provide in-depth
information, practical solutions, and valuable tools related to
CVE-2025-54253
.
URL | Resource |
---|---|
https://helpx.adobe.com/security/products/aem-forms/apsb25-82.html | Vendor Advisory |
https://slcyber.io/assetnote-security-research-center/struts-devmode-in-2025-critical-pre-auth-vulnerabilities-in-adobe-experience-manager-forms/ | Exploit Third Party Advisory |
CWE - Common Weakness Enumeration
While CVE identifies
specific instances of vulnerabilities, CWE categorizes the common flaws or
weaknesses that can lead to vulnerabilities. CVE-2025-54253
is
associated with the following CWEs:
Common Attack Pattern Enumeration and Classification (CAPEC)
Common Attack Pattern Enumeration and Classification
(CAPEC)
stores attack patterns, which are descriptions of the common attributes and
approaches employed by adversaries to exploit the CVE-2025-54253
weaknesses.
We scan GitHub repositories to detect new proof-of-concept exploits. Following list is a collection of public exploits and proof-of-concepts, which have been published on GitHub (sorted by the most recently updated).
🐙 CVE-2025-54253 exploit demo for Adobe AEM Forms on JEE: OGNL injection to RCE with PoC, Python 3.10 exploit code, reproducer and mitigation guidance.
aem-forms-on-jee curl cve-2025-54253 cybersecurity ethical-hacking exploit local-testing offensive-security ognl-injection-vulnerability penetration-testing poc proof-of-concept rce red-team remote-code-execution vmware-lab vulnerability-research
Python
None
Simulated PoC for CVE-2025-54253: Adobe AEM OGNL Injection Vulnerability
adobe-aem curl cybersecurity ethical-hacking exploit infosec local-testing offensive-security ognl-injection-vulnerability penetration-testing poc proof-of-concept rce red-team remote-code-execution vulnerability-research aem-forms-on-jee cve-2025-54253 vmware-lab
Python
CVE-2025-54253
📡 PoC auto collect from GitHub. ⚠️ Be careful Malware.
security cve exploit poc vulnerability
Results are limited to the first 15 repositories due to potential performance issues.
The following list is the news that have been mention
CVE-2025-54253
vulnerability anywhere in the article.

-
Help Net Security
Week in review: SonicWall firewalls targeted in ransomware attacks, Black Hat USA 2025
Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Black Hat USA 2025 Black Hat USA 2025 took place at the Mandalay Bay Convention Center in Las Vegas. E ... Read more

-
Help Net Security
Adobe patches critical Adobe Experience Manager Forms vulnerabilities with public PoC
Adobe has released an emergency security update for Adobe Experience Manager Forms on Java Enterprise Edition (JEE), which fix two critical vulnerabilities (CVE-2025-54253, CVE-2025-54254) with a publ ... Read more

-
CybersecurityNews
Adobe AEM Forms 0-Day Vulnerability Let Attackers Execute Arbitrary Code
Adobe has released an urgent security update for Adobe Experience Manager Forms on Java Enterprise Edition (JEE) to address two critical zero-day vulnerabilities that could allow attackers to execute ... Read more

-
security.nl
Adobe komt met noodpatch voor kritieke lekken in Experience Manager Forms
Adobe heeft een noodpatch uitgebracht voor twee kritieke kwetsbaarheden in Experience Manager Forms en roept organisaties op die zo snel mogelijk te installeren. Voor de beveiligingslekken is proof-of ... Read more

-
Daily CyberSecurity
Adobe AEM Forms Patch: Critical Flaws (CVE-2025-54253, CVSS 10.0) Allow RCE & Arbitrary File Read, Public PoCs Available
Adobe has released urgent patches for two critical vulnerabilities affecting Adobe Experience Manager (AEM) Forms on JEE, versions 6.5.23.0 and earlier. The flaws — tracked as CVE-2025-54253 and CVE-2 ... Read more

-
Daily CyberSecurity
The Fake Crypto Bot Scam: How Smart Contracts & AI Videos Are Stealing Millions on YouTube
SentinelLABS has detailed a coordinated wave of cryptocurrency scams weaponizing malicious smart contracts promoted as arbitrage trading bots — all orchestrated through aged YouTube accounts and AI-ge ... Read more

-
BleepingComputer
Adobe issues emergency fixes for AEM Forms zero-days after PoCs released
Adobe released emergency updates for two zero-day flaws in Adobe Experience Manager (AEM) Forms on JEE after a PoC exploit chain was disclosed that can be used for unauthenticated, remote code executi ... Read more
The following table lists the changes that have been made to the
CVE-2025-54253
vulnerability over time.
Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability's severity, exploitability, or other characteristics.
-
Initial Analysis by [email protected]
Aug. 13, 2025
Action Type Old Value New Value Added CWE NVD-CWE-noinfo Added CPE Configuration OR *cpe:2.3:a:adobe:experience_manager_forms:*:*:*:*:*:*:*:* versions up to (including) 6.5.23.0 Added Reference Type Adobe Systems Incorporated: https://helpx.adobe.com/security/products/aem-forms/apsb25-82.html Types: Vendor Advisory Added Reference Type CISA-ADP: https://slcyber.io/assetnote-security-research-center/struts-devmode-in-2025-critical-pre-auth-vulnerabilities-in-adobe-experience-manager-forms/ Types: Exploit, Third Party Advisory -
CVE Modified by 134c704f-9b21-4f2e-91b3-4a467353bcc0
Aug. 06, 2025
Action Type Old Value New Value Added Reference https://slcyber.io/assetnote-security-research-center/struts-devmode-in-2025-critical-pre-auth-vulnerabilities-in-adobe-experience-manager-forms/ -
New CVE Received by [email protected]
Aug. 05, 2025
Action Type Old Value New Value Added Description Adobe Experience Manager versions 6.5.23 and earlier are affected by a Misconfiguration vulnerability that could result in arbitrary code execution. An attacker could leverage this vulnerability to bypass security mechanisms and execute code. Exploitation of this issue does not require user interaction and scope is changed. Added CVSS V3.1 AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H Added CWE CWE-16 Added Reference https://helpx.adobe.com/security/products/aem-forms/apsb25-82.html