PT-2025-28765 · Adobe · Experience Manager
Published
2025-07-08
·
Updated
2025-09-26
·
CVE-2025-49533
10
Critical
Base vector | Vector | AV:N/AC:L/Au:N/C:C/I:C/A:C |
**Name of the Vulnerable Software and Affected Versions**
Adobe Experience Manager (MS) versions 6.5.23.0 and earlier
Adobe Experience Manager (AEM) Forms on JEE (affected versions not specified)
**Description**
The software is susceptible to a Deserialization of Untrusted Data issue. Successful exploitation of this issue does not require user interaction and could allow a remote attacker to execute arbitrary code. The vulnerability resides in the FormServer module, specifically within the `GetDocumentServlet` endpoint. The servlet processes user-supplied data, decoding and deserializing it without proper validation. An attacker can send malicious data, potentially encoded in Base64 and compressed with gzip, to execute commands on the server. The API endpoint `/FormServer/servlet/GetDocumentServlet` is used to deliver the malicious payload. The vulnerable parameter is `serDoc`. A Python server can be used to emulate the deserialization process, demonstrating how a crafted payload can lead to Remote Code Execution (RCE).
**Recommendations**
Update Adobe Experience Manager to a version later than 6.5.23.0.
Update Adobe AEM Forms on JEE to a newer version that addresses this issue.
Fix
RCE
Deserialization of Untrusted Data
Weakness Enumeration
Related Identifiers
Affected Products
References · 17
- https://bdu.fstec.ru/vul/2025-08732 · Security Note
- https://nvd.nist.gov/vuln/detail/CVE-2025-49533 · Security Note
- https://helpx.adobe.com/security/products/aem-forms/apsb25-67.html · Vendor Advisory
- https://twitter.com/ErcanSah1n/status/1961326976226267163 · Twitter Post
- https://reddit.com/r/CVEWatch/comments/1n0hqrs/top_10_trending_cves_26082025 · Reddit Post
- https://reddit.com/r/CVEWatch/comments/1mzmd82/top_10_trending_cves_25082025 · Reddit Post
- https://twitter.com/win3zz/status/1959518434792014307 · Twitter Post
- https://twitter.com/SirajD_Official/status/1958024441092534405 · Twitter Post
- https://twitter.com/CloudVirtues/status/1959616890864828787 · Twitter Post
- https://twitter.com/mayurk21/status/1958089901611835615 · Twitter Post
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-49533 · Note
- https://twitter.com/Likhithkumar_S/status/1963548917666095573 · Twitter Post
- https://twitter.com/threatintel/status/1957761082195423742 · Twitter Post
- https://twitter.com/CVEnew/status/1942958392630301011 · Twitter Post
- https://t.me/cvenotify/129450 · Telegram Post