Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Adobe Issues Out-of-Band Patches for AEM Forms Vulnerabilities With Public PoC

Posted on August 6, 2025August 6, 2025 By CWS

Adobe on Tuesday launched out-of-band safety updates that handle two severe vulnerabilities in Adobe Expertise Supervisor Varieties (AEM Varieties) on Java Enterprise Version (JEE) for which public exploit code exists.

The 2 flaws are tracked as CVE-2025-54253 (CVSS rating of 10.0) and CVE-2025-54254 (CVSS rating of 8.6) and will be exploited to execute arbitrary code or learn arbitrary information on the system.

“Adobe is conscious that CVE-2025-54253 and CVE-2025-54254 have a publicly obtainable proof-of-concept. Adobe isn’t conscious of those points being exploited within the wild,” the corporate notes in its advisory.

Crediting Shubham Shah and Adam Kues of Assetnote (which was acquired by Searchlight Cyber in January 2025) for reporting the vulnerabilities, Adobe urges prospects to use the newly launched hotfixes that resolve each flaws.

Whereas Adobe merely describes CVE-2025-54253 as a misconfiguration problem, Searchlight Cyber explains that it combines an authentication bypass with the Struts growth mode for the admin UI being left enabled.

This mixture allowed the safety researchers to craft a payload resulting in the execution of Object-Graph Navigation Language (OGNL) expressions.

“It’s trivial to escalate this to distant command execution via the numerous public sandbox bypasses obtainable. In our case, we have been coping with a relatively complicated WAF, and for the reason that payload was throughout the GET request’s first line part, we needed to be considerably inventive to realize RCE,” Searchlight Cyber says.

CVE-2025-54254, described as an improper restriction of XML Exterior Entity Reference (XXE) defect, exists as a result of an authentication mechanism in AEM Varieties loaded an XML doc insecurely, thus being exploitable with out authentication.Commercial. Scroll to proceed studying.

Searchlight Cyber reported the 2 points to Adobe in April, together with CVE-2025-49533 (CVSS rating of 9.8) a critical-severity deserialization of untrusted information vulnerability that was resolved as a part of Adobe’s July 2025 safety updates.

On July 29, consistent with its 90-day disclosure coverage, Searchlight Cyber launched technical data and proof-of-concept (PoC) code focusing on all three safety defects, urging customers to limit entry to AEM Varieties in standalone deployments.

“All of the vulnerabilities we’ve disclosed in AEM Varieties are usually not complicated,” Searchlight says. “As a substitute, these points are what we’d anticipate to have been found years in the past. Beforehand referred to as LiveCycle, this product line has been in use by enterprises for nearly 20 years. That raises the query of why these easy vulnerabilities had not been caught by others or fastened by Adobe.”

Associated: Adobe Patches Crucial Code Execution Bugs

Associated: Rowhammer Assault Demonstrated In opposition to Nvidia GPU

Associated: Crimson Teaming AI: The Construct Vs Purchase Debate

Associated: SecurityWeek Cyber Insights 2024 Collection

Security Week News Tags:Adobe, AEM, Forms, Issues, OutofBand, Patches, PoC, Public, Vulnerabilities

Post navigation

Previous Post: Trend Micro Confirms Active Exploitation of Critical Apex One Flaws in On-Premise Systems
Next Post: Black Hat USA 2025 – Summary of Vendor Announcements (Part 2)

Related Posts

Law Firms Warned of Silent Ransom Group Attacks Security Week News
Grok-4 Falls to a Jailbreak Two days After Its Release Security Week News
Microsoft, CrowdStrike Lead Effort to Map Threat Actor Names Security Week News
MainStreet Bank Data Breach Impacts Customer Payment Cards  Security Week News
Cityworks Zero-Day Exploited by Chinese Hackers in US Local Government Attacks Security Week News
Trump Cybersecurity Executive Order Targets Digital Identity, Sanctions Policies Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Microsoft Paid Out $17 Million in Bug Bounties in Past Year
  • Over 1 Million Impacted by DaVita Data Breach
  • Akira Ransomware Uses Windows Drivers to Bypass AV/EDR in SonicWall Attacks
  • Flaws Expose 100 Dell Laptop Models to Implants, Windows Login Bypass
  • Chinese Hackers Exploit SharePoint Vulnerabilities to Deploy Toolsets Includes Backdoor, Ransomware and Loaders

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Microsoft Paid Out $17 Million in Bug Bounties in Past Year
  • Over 1 Million Impacted by DaVita Data Breach
  • Akira Ransomware Uses Windows Drivers to Bypass AV/EDR in SonicWall Attacks
  • Flaws Expose 100 Dell Laptop Models to Implants, Windows Login Bypass
  • Chinese Hackers Exploit SharePoint Vulnerabilities to Deploy Toolsets Includes Backdoor, Ransomware and Loaders

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News