Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Adobe Issues Out-of-Band Patches for AEM Forms Vulnerabilities With Public PoC

Posted on August 6, 2025August 6, 2025 By CWS

Adobe on Tuesday launched out-of-band safety updates that handle two severe vulnerabilities in Adobe Expertise Supervisor Varieties (AEM Varieties) on Java Enterprise Version (JEE) for which public exploit code exists.

The 2 flaws are tracked as CVE-2025-54253 (CVSS rating of 10.0) and CVE-2025-54254 (CVSS rating of 8.6) and will be exploited to execute arbitrary code or learn arbitrary information on the system.

“Adobe is conscious that CVE-2025-54253 and CVE-2025-54254 have a publicly obtainable proof-of-concept. Adobe isn’t conscious of those points being exploited within the wild,” the corporate notes in its advisory.

Crediting Shubham Shah and Adam Kues of Assetnote (which was acquired by Searchlight Cyber in January 2025) for reporting the vulnerabilities, Adobe urges prospects to use the newly launched hotfixes that resolve each flaws.

Whereas Adobe merely describes CVE-2025-54253 as a misconfiguration problem, Searchlight Cyber explains that it combines an authentication bypass with the Struts growth mode for the admin UI being left enabled.

This mixture allowed the safety researchers to craft a payload resulting in the execution of Object-Graph Navigation Language (OGNL) expressions.

“It’s trivial to escalate this to distant command execution via the numerous public sandbox bypasses obtainable. In our case, we have been coping with a relatively complicated WAF, and for the reason that payload was throughout the GET request’s first line part, we needed to be considerably inventive to realize RCE,” Searchlight Cyber says.

CVE-2025-54254, described as an improper restriction of XML Exterior Entity Reference (XXE) defect, exists as a result of an authentication mechanism in AEM Varieties loaded an XML doc insecurely, thus being exploitable with out authentication.Commercial. Scroll to proceed studying.

Searchlight Cyber reported the 2 points to Adobe in April, together with CVE-2025-49533 (CVSS rating of 9.8) a critical-severity deserialization of untrusted information vulnerability that was resolved as a part of Adobe’s July 2025 safety updates.

On July 29, consistent with its 90-day disclosure coverage, Searchlight Cyber launched technical data and proof-of-concept (PoC) code focusing on all three safety defects, urging customers to limit entry to AEM Varieties in standalone deployments.

“All of the vulnerabilities we’ve disclosed in AEM Varieties are usually not complicated,” Searchlight says. “As a substitute, these points are what we’d anticipate to have been found years in the past. Beforehand referred to as LiveCycle, this product line has been in use by enterprises for nearly 20 years. That raises the query of why these easy vulnerabilities had not been caught by others or fastened by Adobe.”

Associated: Adobe Patches Crucial Code Execution Bugs

Associated: Rowhammer Assault Demonstrated In opposition to Nvidia GPU

Associated: Crimson Teaming AI: The Construct Vs Purchase Debate

Associated: SecurityWeek Cyber Insights 2024 Collection

Security Week News Tags:Adobe, AEM, Forms, Issues, OutofBand, Patches, PoC, Public, Vulnerabilities

Post navigation

Previous Post: Trend Micro Confirms Active Exploitation of Critical Apex One Flaws in On-Premise Systems
Next Post: Black Hat USA 2025 – Summary of Vendor Announcements (Part 2)

Related Posts

Critical Vulnerability Patched in Citrix NetScaler Security Week News
CISA Warns of SysAid Vulnerability Exploitation Security Week News
ThreatSpike Raises $14 Million in Series A Funding Security Week News
Google Says AI Agent Thwarted Exploitation of Critical Vulnerability  Security Week News
RevEng.ai Raises $4.15 Million to Secure Software Supply Chain Security Week News
Rethinking Success in Security: Why Climbing the Corporate Ladder Isn’t Always the Goal Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Microsoft Exchange Server Vulnerability Enables Privelege Escalation
  • Major Enterprise AI Assistants Can Be Abused for Data Theft, Manipulation
  • Enterprise Secrets Exposed by CyberArk Conjur Vulnerabilities
  • How to Secure Data in Transit and at Rest
  • Researchers Uncover ECScape Flaw in Amazon ECS Enabling Cross-Task Credential Theft

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Microsoft Exchange Server Vulnerability Enables Privelege Escalation
  • Major Enterprise AI Assistants Can Be Abused for Data Theft, Manipulation
  • Enterprise Secrets Exposed by CyberArk Conjur Vulnerabilities
  • How to Secure Data in Transit and at Rest
  • Researchers Uncover ECScape Flaw in Amazon ECS Enabling Cross-Task Credential Theft

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News