Severity
High
Analysis Summary
CVE-2025-49552 CVSS:7.3
Adobe Connect is vulnerable to a DOM-based cross-site scripting, caused by improper validation of user-supplied input. A remote attacker could exploit this vulnerability using a specially-crafted URL to execute script in a victim's Web browser within the security context of the hosting Web site, once the URL is clicked. An attacker could use this vulnerability to steal the victim's cookie-based authentication credentials.
CVE-2025-49553 CVSS:9.3
Adobe Connect is vulnerable to a DOM-based cross-site scripting, caused by improper validation of user-supplied input. A remote attacker could exploit this vulnerability using a specially-crafted URL to execute script in a victim's Web browser within the security context of the hosting Web site, once the URL is clicked. An attacker could use this vulnerability to steal the victim's cookie-based authentication credentials.
CVE-2025-54263 CVSS:8.1
Adobe Commerce and Magento Open Source could allow a remote attacker to bypass security restrictions, caused by an incorrect authorization error. By persuading a victim to open a specially crafted document, a remote attacker could exploit this vulnerability to bypass the security feature.
CVE-2025-54264 CVSS:8.1
Adobe Commerce and Magento Open Source are vulnerable to cross-site scripting, caused by improper validation of user-supplied input. A remote authenticated attacker could exploit this vulnerability to inject malicious script into a Web page which would be executed in a victim's Web browser within the security context of the hosting Web site, once the page is viewed. An attacker could use this vulnerability to steal the victim's cookie-based authentication credentials.
Impact
- Cross-site Scripting
- Security Bypass
- Gain Access
Indicators of Compromise
CVE
CVE-2025-49552
CVE-2025-49553
CVE-2025-54263
CVE-2025-54264
Affected Vendors
- Adobe
Affected Products
- Adobe Connect 12.9
- Adobe Commerce 2.4.4-p1
- Adobe Commerce B2B 1.3.3-p15
Remediation
Refer to Adobe Security Bulletin or patch, upgrade or suggested workaround information.

