Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2025-46840 (GCVE-0-2025-46840)
Vulnerability from cvelistv5 – Published: 2025-06-10 22:18 – Updated: 2026-02-26 17:50
VLAI?
EPSS
Title
Adobe Experience Manager | Improper Authorization (CWE-285)
Summary
Adobe Experience Manager versions 6.5.22 and earlier are affected by an Improper Authorization vulnerability that could result in Privilege escalation. A low privileged attacker could leverage this vulnerability to bypass security measures and gain unauthorized access. Exploitation of this issue requires user interaction. A successful attacker can abuse this to achieve session takeover, increasing the confidentiality and integrity impact as high.
Severity ?
8.7 (High)
CWE
- CWE-285 - Improper Authorization (CWE-285)
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Adobe | Adobe Experience Manager |
Affected:
0 , ≤ 6.5.22
(semver)
|
Date Public ?
2025-06-10 17:00
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-46840",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-06-12T03:55:10.604257Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2026-02-26T17:50:44.581Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "affected",
"product": "Adobe Experience Manager",
"vendor": "Adobe",
"versions": [
{
"lessThanOrEqual": "6.5.22",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
}
],
"datePublic": "2025-06-10T17:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "Adobe Experience Manager versions 6.5.22 and earlier are affected by an Improper Authorization vulnerability that could result in Privilege escalation. A low privileged attacker could leverage this vulnerability to bypass security measures and gain unauthorized access. Exploitation of this issue requires user interaction. A successful attacker can abuse this to achieve session takeover, increasing the confidentiality and integrity impact as high."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 8.7,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"confidentialityRequirement": "NOT_DEFINED",
"environmentalScore": 8.7,
"environmentalSeverity": "HIGH",
"exploitCodeMaturity": "NOT_DEFINED",
"integrityImpact": "HIGH",
"integrityRequirement": "NOT_DEFINED",
"modifiedAttackComplexity": "LOW",
"modifiedAttackVector": "NETWORK",
"modifiedAvailabilityImpact": "NONE",
"modifiedConfidentialityImpact": "HIGH",
"modifiedIntegrityImpact": "HIGH",
"modifiedPrivilegesRequired": "LOW",
"modifiedScope": "CHANGED",
"modifiedUserInteraction": "REQUIRED",
"privilegesRequired": "LOW",
"remediationLevel": "NOT_DEFINED",
"reportConfidence": "NOT_DEFINED",
"scope": "CHANGED",
"temporalScore": 8.7,
"temporalSeverity": "HIGH",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-285",
"description": "Improper Authorization (CWE-285)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-06-10T22:18:33.290Z",
"orgId": "078d4453-3bcd-4900-85e6-15281da43538",
"shortName": "adobe"
},
"references": [
{
"tags": [
"vendor-advisory"
],
"url": "https://helpx.adobe.com/security/products/experience-manager/apsb25-48.html"
}
],
"source": {
"discovery": "EXTERNAL"
},
"title": "Adobe Experience Manager | Improper Authorization (CWE-285)"
}
},
"cveMetadata": {
"assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538",
"assignerShortName": "adobe",
"cveId": "CVE-2025-46840",
"datePublished": "2025-06-10T22:18:33.290Z",
"dateReserved": "2025-04-30T20:47:54.945Z",
"dateUpdated": "2026-02-26T17:50:44.581Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2025-46840\",\"sourceIdentifier\":\"psirt@adobe.com\",\"published\":\"2025-06-10T23:15:24.350\",\"lastModified\":\"2025-06-13T13:04:39.607\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Adobe Experience Manager versions 6.5.22 and earlier are affected by an Improper Authorization vulnerability that could result in Privilege escalation. A low privileged attacker could leverage this vulnerability to bypass security measures and gain unauthorized access. Exploitation of this issue requires user interaction. A successful attacker can abuse this to achieve session takeover, increasing the confidentiality and integrity impact as high.\"},{\"lang\":\"es\",\"value\":\"Las versiones 6.5.22 y anteriores de Adobe Experience Manager se ven afectadas por una vulnerabilidad de autorizaci\u00f3n incorrecta que podr\u00eda provocar una escalada de privilegios. Un atacante con pocos privilegios podr\u00eda aprovechar esta vulnerabilidad para eludir las medidas de seguridad y obtener acceso no autorizado. Para explotar este problema se requiere la interacci\u00f3n del usuario. Un atacante con \u00e9xito puede abusar de esta vulnerabilidad para tomar el control de la sesi\u00f3n, lo que aumenta el impacto en la confidencialidad y la integridad.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"psirt@adobe.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N\",\"baseScore\":8.7,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"REQUIRED\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.3,\"impactScore\":5.8}]},\"weaknesses\":[{\"source\":\"psirt@adobe.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-285\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:experience_manager:*:*:*:*:-:*:*:*\",\"versionEndExcluding\":\"6.5.23.0\",\"matchCriteriaId\":\"15DC0724-7B85-4EC8-B9E6-76DA0F26F6D5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*\",\"versionEndExcluding\":\"2025.5.0\",\"matchCriteriaId\":\"8A395D75-088D-41C2-BCE6-30CB049798FE\"}]}]}],\"references\":[{\"url\":\"https://helpx.adobe.com/security/products/experience-manager/apsb25-48.html\",\"source\":\"psirt@adobe.com\",\"tags\":[\"Vendor Advisory\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2025-46840\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-06-11T14:05:14.031261Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-06-11T14:05:15.469Z\"}}], \"cna\": {\"title\": \"Adobe Experience Manager | Improper Authorization (CWE-285)\", \"source\": {\"discovery\": \"EXTERNAL\"}, \"metrics\": [{\"format\": \"CVSS\", \"cvssV3_1\": {\"scope\": \"CHANGED\", \"version\": \"3.1\", \"baseScore\": 8.7, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N\", \"modifiedScope\": \"CHANGED\", \"temporalScore\": 8.7, \"integrityImpact\": \"HIGH\", \"userInteraction\": \"REQUIRED\", \"attackComplexity\": \"LOW\", \"remediationLevel\": \"NOT_DEFINED\", \"reportConfidence\": \"NOT_DEFINED\", \"temporalSeverity\": \"HIGH\", \"availabilityImpact\": \"NONE\", \"environmentalScore\": 8.7, \"privilegesRequired\": \"LOW\", \"exploitCodeMaturity\": \"NOT_DEFINED\", \"integrityRequirement\": \"NOT_DEFINED\", \"modifiedAttackVector\": \"NETWORK\", \"confidentialityImpact\": \"HIGH\", \"environmentalSeverity\": \"HIGH\", \"availabilityRequirement\": \"NOT_DEFINED\", \"modifiedIntegrityImpact\": \"HIGH\", \"modifiedUserInteraction\": \"REQUIRED\", \"modifiedAttackComplexity\": \"LOW\", \"confidentialityRequirement\": \"NOT_DEFINED\", \"modifiedAvailabilityImpact\": \"NONE\", \"modifiedPrivilegesRequired\": \"LOW\", \"modifiedConfidentialityImpact\": \"HIGH\"}, \"scenarios\": [{\"lang\": \"en\", \"value\": \"GENERAL\"}]}], \"affected\": [{\"vendor\": \"Adobe\", \"product\": \"Adobe Experience Manager\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"6.5.22\"}], \"defaultStatus\": \"affected\"}], \"datePublic\": \"2025-06-10T17:00:00.000Z\", \"references\": [{\"url\": \"https://helpx.adobe.com/security/products/experience-manager/apsb25-48.html\", \"tags\": [\"vendor-advisory\"]}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"Adobe Experience Manager versions 6.5.22 and earlier are affected by an Improper Authorization vulnerability that could result in Privilege escalation. A low privileged attacker could leverage this vulnerability to bypass security measures and gain unauthorized access. Exploitation of this issue requires user interaction. A successful attacker can abuse this to achieve session takeover, increasing the confidentiality and integrity impact as high.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-285\", \"description\": \"Improper Authorization (CWE-285)\"}]}], \"providerMetadata\": {\"orgId\": \"078d4453-3bcd-4900-85e6-15281da43538\", \"shortName\": \"adobe\", \"dateUpdated\": \"2025-06-10T22:18:33.290Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2025-46840\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-06-12T03:55:09.562Z\", \"dateReserved\": \"2025-04-30T20:47:54.945Z\", \"assignerOrgId\": \"078d4453-3bcd-4900-85e6-15281da43538\", \"datePublished\": \"2025-06-10T22:18:33.290Z\", \"assignerShortName\": \"adobe\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
CNVD-2025-15851
Vulnerability from cnvd - Published: 2025-07-16
VLAI Severity ?
Title
Adobe Experience Manager授权问题漏洞
Description
Adobe Experience Manager是美国奥多比(Adobe)公司的一套可用于构建网站、移动应用程序和表单的内容管理解决方案。该方案支持移动内容管理、营销销售活动管理和多站点管理等。
Adobe Experience Manager存在授权问题漏洞,攻击者可利用该漏洞提升权限。
Severity
高
Patch Name
Adobe Experience Manager授权问题漏洞的补丁
Patch Description
Adobe Experience Manager是美国奥多比(Adobe)公司的一套可用于构建网站、移动应用程序和表单的内容管理解决方案。该方案支持移动内容管理、营销销售活动管理和多站点管理等。
Adobe Experience Manager存在授权问题漏洞,攻击者可利用该漏洞提升权限。目前,供应商发布了安全公告及相关补丁信息,修复了此漏洞。
Formal description
厂商已发布了漏洞修复程序,请及时关注更新: https://helpx.adobe.com/security/products/experience-manager/apsb25-48.html
Reference
https://helpx.adobe.com/security/products/experience-manager/apsb25-48.html
Impacted products
| Name | ['Adobe Adobe Experience Manager AEM Cloud Service (CS)', 'Adobe Adobe Experience Manager <=6.5.22'] |
|---|
{
"cves": {
"cve": {
"cveNumber": "CVE-2025-46840",
"cveUrl": "https://nvd.nist.gov/vuln/detail/CVE-2025-46840"
}
},
"description": "Adobe Experience Manager\u662f\u7f8e\u56fd\u5965\u591a\u6bd4\uff08Adobe\uff09\u516c\u53f8\u7684\u4e00\u5957\u53ef\u7528\u4e8e\u6784\u5efa\u7f51\u7ad9\u3001\u79fb\u52a8\u5e94\u7528\u7a0b\u5e8f\u548c\u8868\u5355\u7684\u5185\u5bb9\u7ba1\u7406\u89e3\u51b3\u65b9\u6848\u3002\u8be5\u65b9\u6848\u652f\u6301\u79fb\u52a8\u5185\u5bb9\u7ba1\u7406\u3001\u8425\u9500\u9500\u552e\u6d3b\u52a8\u7ba1\u7406\u548c\u591a\u7ad9\u70b9\u7ba1\u7406\u7b49\u3002\n\nAdobe Experience Manager\u5b58\u5728\u6388\u6743\u95ee\u9898\u6f0f\u6d1e\uff0c\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u63d0\u5347\u6743\u9650\u3002",
"formalWay": "\u5382\u5546\u5df2\u53d1\u5e03\u4e86\u6f0f\u6d1e\u4fee\u590d\u7a0b\u5e8f\uff0c\u8bf7\u53ca\u65f6\u5173\u6ce8\u66f4\u65b0\uff1a\r\nhttps://helpx.adobe.com/security/products/experience-manager/apsb25-48.html",
"isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
"number": "CNVD-2025-15851",
"openTime": "2025-07-16",
"patchDescription": "Adobe Experience Manager\u662f\u7f8e\u56fd\u5965\u591a\u6bd4\uff08Adobe\uff09\u516c\u53f8\u7684\u4e00\u5957\u53ef\u7528\u4e8e\u6784\u5efa\u7f51\u7ad9\u3001\u79fb\u52a8\u5e94\u7528\u7a0b\u5e8f\u548c\u8868\u5355\u7684\u5185\u5bb9\u7ba1\u7406\u89e3\u51b3\u65b9\u6848\u3002\u8be5\u65b9\u6848\u652f\u6301\u79fb\u52a8\u5185\u5bb9\u7ba1\u7406\u3001\u8425\u9500\u9500\u552e\u6d3b\u52a8\u7ba1\u7406\u548c\u591a\u7ad9\u70b9\u7ba1\u7406\u7b49\u3002\r\n\r\nAdobe Experience Manager\u5b58\u5728\u6388\u6743\u95ee\u9898\u6f0f\u6d1e\uff0c\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u63d0\u5347\u6743\u9650\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
"patchName": "Adobe Experience Manager\u6388\u6743\u95ee\u9898\u6f0f\u6d1e\u7684\u8865\u4e01",
"products": {
"product": [
"Adobe Adobe Experience Manager AEM Cloud Service (CS)",
"Adobe Adobe Experience Manager \u003c=6.5.22"
]
},
"referenceLink": "https://helpx.adobe.com/security/products/experience-manager/apsb25-48.html",
"serverity": "\u9ad8",
"submitTime": "2025-06-13",
"title": "Adobe Experience Manager\u6388\u6743\u95ee\u9898\u6f0f\u6d1e"
}
FKIE_CVE-2025-46840
Vulnerability from fkie_nvd - Published: 2025-06-10 23:15 - Updated: 2025-06-13 13:04
Severity ?
Summary
Adobe Experience Manager versions 6.5.22 and earlier are affected by an Improper Authorization vulnerability that could result in Privilege escalation. A low privileged attacker could leverage this vulnerability to bypass security measures and gain unauthorized access. Exploitation of this issue requires user interaction. A successful attacker can abuse this to achieve session takeover, increasing the confidentiality and integrity impact as high.
References
| URL | Tags | ||
|---|---|---|---|
| psirt@adobe.com | https://helpx.adobe.com/security/products/experience-manager/apsb25-48.html | Vendor Advisory |
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| adobe | experience_manager | * | |
| adobe | experience_manager | * |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:-:*:*:*",
"matchCriteriaId": "15DC0724-7B85-4EC8-B9E6-76DA0F26F6D5",
"versionEndExcluding": "6.5.23.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*",
"matchCriteriaId": "8A395D75-088D-41C2-BCE6-30CB049798FE",
"versionEndExcluding": "2025.5.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Adobe Experience Manager versions 6.5.22 and earlier are affected by an Improper Authorization vulnerability that could result in Privilege escalation. A low privileged attacker could leverage this vulnerability to bypass security measures and gain unauthorized access. Exploitation of this issue requires user interaction. A successful attacker can abuse this to achieve session takeover, increasing the confidentiality and integrity impact as high."
},
{
"lang": "es",
"value": "Las versiones 6.5.22 y anteriores de Adobe Experience Manager se ven afectadas por una vulnerabilidad de autorizaci\u00f3n incorrecta que podr\u00eda provocar una escalada de privilegios. Un atacante con pocos privilegios podr\u00eda aprovechar esta vulnerabilidad para eludir las medidas de seguridad y obtener acceso no autorizado. Para explotar este problema se requiere la interacci\u00f3n del usuario. Un atacante con \u00e9xito puede abusar de esta vulnerabilidad para tomar el control de la sesi\u00f3n, lo que aumenta el impacto en la confidencialidad y la integridad."
}
],
"id": "CVE-2025-46840",
"lastModified": "2025-06-13T13:04:39.607",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 8.7,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.3,
"impactScore": 5.8,
"source": "psirt@adobe.com",
"type": "Secondary"
}
]
},
"published": "2025-06-10T23:15:24.350",
"references": [
{
"source": "psirt@adobe.com",
"tags": [
"Vendor Advisory"
],
"url": "https://helpx.adobe.com/security/products/experience-manager/apsb25-48.html"
}
],
"sourceIdentifier": "psirt@adobe.com",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-285"
}
],
"source": "psirt@adobe.com",
"type": "Secondary"
}
]
}
WID-SEC-W-2025-1285
Vulnerability from csaf_certbund - Published: 2025-06-10 22:00 - Updated: 2025-08-05 22:00Summary
Adobe Experience Manager: Mehrere Schwachstellen ermöglichen Privilegieneskalation
Severity
Hoch
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung: Adobe Experience Manager (AEM) ist eine Content-Management-Lösung für die Erstellung von Websites, mobilen Anwendungen und Formularen.
Angriff: Ein entfernter, authentisierter Angreifer kann mehrere Schwachstellen in Adobe Experience Manager ausnutzen, Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuführen oder Sicherheitsvorkehrungen zu umgehen.
Betroffene Betriebssysteme: - Linux
- Sonstiges
- UNIX
- Windows
References
{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Adobe Experience Manager (AEM) ist eine Content-Management-L\u00f6sung f\u00fcr die Erstellung von Websites, mobilen Anwendungen und Formularen.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein entfernter, authentisierter Angreifer kann mehrere Schwachstellen in Adobe Experience Manager ausnutzen, Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuf\u00fchren oder Sicherheitsvorkehrungen zu umgehen.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Linux\n- Sonstiges\n- UNIX\n- Windows",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2025-1285 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2025/wid-sec-w-2025-1285.json"
},
{
"category": "self",
"summary": "WID-SEC-2025-1285 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-1285"
},
{
"category": "external",
"summary": "Adobe Security Bulletin APSB25-48 vom 2025-06-10",
"url": "https://helpx.adobe.com/security/products/experience-manager/apsb25-48.html"
}
],
"source_lang": "en-US",
"title": "Adobe Experience Manager: Mehrere Schwachstellen erm\u00f6glichen Privilegieneskalation",
"tracking": {
"current_release_date": "2025-08-05T22:00:00.000+00:00",
"generator": {
"date": "2025-08-06T08:09:24.797+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.4.0"
}
},
"id": "WID-SEC-W-2025-1285",
"initial_release_date": "2025-06-10T22:00:00.000+00:00",
"revision_history": [
{
"date": "2025-06-10T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2025-07-16T22:00:00.000+00:00",
"number": "2",
"summary": "CVE erg\u00e4nzt"
},
{
"date": "2025-07-24T22:00:00.000+00:00",
"number": "3",
"summary": "CVE-Nummern erg\u00e4nzt"
},
{
"date": "2025-07-30T22:00:00.000+00:00",
"number": "4",
"summary": "CVE erg\u00e4nzt"
},
{
"date": "2025-08-05T22:00:00.000+00:00",
"number": "5",
"summary": "Referenz(en) aufgenommen: EUVD-2025-23630"
}
],
"status": "final",
"version": "5"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "Cloud Service Release \u003c2025.5",
"product": {
"name": "Adobe Experience Manager Cloud Service Release \u003c2025.5",
"product_id": "T044487"
}
},
{
"category": "product_version",
"name": "Cloud Service Release 2025.5",
"product": {
"name": "Adobe Experience Manager Cloud Service Release 2025.5",
"product_id": "T044487-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:adobe:experience_manager:cloud_service_release__2025.5"
}
}
},
{
"category": "product_version_range",
"name": "\u003c6.5.23",
"product": {
"name": "Adobe Experience Manager \u003c6.5.23",
"product_id": "T044488"
}
},
{
"category": "product_version",
"name": "6.5.23",
"product": {
"name": "Adobe Experience Manager 6.5.23",
"product_id": "T044488-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:adobe:experience_manager:6.5.23"
}
}
}
],
"category": "product_name",
"name": "Experience Manager"
}
],
"category": "vendor",
"name": "Adobe"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-25690",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2023-25690"
},
{
"cve": "CVE-2025-46837",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46837"
},
{
"cve": "CVE-2025-46838",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46838"
},
{
"cve": "CVE-2025-46840",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46840"
},
{
"cve": "CVE-2025-46841",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46841"
},
{
"cve": "CVE-2025-46842",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46842"
},
{
"cve": "CVE-2025-46843",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46843"
},
{
"cve": "CVE-2025-46844",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46844"
},
{
"cve": "CVE-2025-46845",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46845"
},
{
"cve": "CVE-2025-46846",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46846"
},
{
"cve": "CVE-2025-46847",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46847"
},
{
"cve": "CVE-2025-46848",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46848"
},
{
"cve": "CVE-2025-46850",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46850"
},
{
"cve": "CVE-2025-46851",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46851"
},
{
"cve": "CVE-2025-46853",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46853"
},
{
"cve": "CVE-2025-46854",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46854"
},
{
"cve": "CVE-2025-46855",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46855"
},
{
"cve": "CVE-2025-46857",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46857"
},
{
"cve": "CVE-2025-46858",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46858"
},
{
"cve": "CVE-2025-46859",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46859"
},
{
"cve": "CVE-2025-46860",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46860"
},
{
"cve": "CVE-2025-46861",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46861"
},
{
"cve": "CVE-2025-46862",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46862"
},
{
"cve": "CVE-2025-46863",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46863"
},
{
"cve": "CVE-2025-46864",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46864"
},
{
"cve": "CVE-2025-46865",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46865"
},
{
"cve": "CVE-2025-46866",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46866"
},
{
"cve": "CVE-2025-46870",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46870"
},
{
"cve": "CVE-2025-46871",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46871"
},
{
"cve": "CVE-2025-46872",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46872"
},
{
"cve": "CVE-2025-46873",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46873"
},
{
"cve": "CVE-2025-46874",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46874"
},
{
"cve": "CVE-2025-46875",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46875"
},
{
"cve": "CVE-2025-46876",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46876"
},
{
"cve": "CVE-2025-46877",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46877"
},
{
"cve": "CVE-2025-46878",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46878"
},
{
"cve": "CVE-2025-46879",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46879"
},
{
"cve": "CVE-2025-46880",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46880"
},
{
"cve": "CVE-2025-46881",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46881"
},
{
"cve": "CVE-2025-46882",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46882"
},
{
"cve": "CVE-2025-46883",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46883"
},
{
"cve": "CVE-2025-46884",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46884"
},
{
"cve": "CVE-2025-46885",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46885"
},
{
"cve": "CVE-2025-46886",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46886"
},
{
"cve": "CVE-2025-46887",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46887"
},
{
"cve": "CVE-2025-46888",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46888"
},
{
"cve": "CVE-2025-46889",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46889"
},
{
"cve": "CVE-2025-46890",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46890"
},
{
"cve": "CVE-2025-46891",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46891"
},
{
"cve": "CVE-2025-46892",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46892"
},
{
"cve": "CVE-2025-46893",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46893"
},
{
"cve": "CVE-2025-46894",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46894"
},
{
"cve": "CVE-2025-46895",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46895"
},
{
"cve": "CVE-2025-46898",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46898"
},
{
"cve": "CVE-2025-46899",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46899"
},
{
"cve": "CVE-2025-46900",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46900"
},
{
"cve": "CVE-2025-46901",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46901"
},
{
"cve": "CVE-2025-46902",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46902"
},
{
"cve": "CVE-2025-46903",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46903"
},
{
"cve": "CVE-2025-46904",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46904"
},
{
"cve": "CVE-2025-46905",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46905"
},
{
"cve": "CVE-2025-46906",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46906"
},
{
"cve": "CVE-2025-46907",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46907"
},
{
"cve": "CVE-2025-46908",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46908"
},
{
"cve": "CVE-2025-46909",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46909"
},
{
"cve": "CVE-2025-46910",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46910"
},
{
"cve": "CVE-2025-46911",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46911"
},
{
"cve": "CVE-2025-46912",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46912"
},
{
"cve": "CVE-2025-46913",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46913"
},
{
"cve": "CVE-2025-46914",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46914"
},
{
"cve": "CVE-2025-46915",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46915"
},
{
"cve": "CVE-2025-46916",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46916"
},
{
"cve": "CVE-2025-46917",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46917"
},
{
"cve": "CVE-2025-46918",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46918"
},
{
"cve": "CVE-2025-46919",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46919"
},
{
"cve": "CVE-2025-46920",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46920"
},
{
"cve": "CVE-2025-46922",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46922"
},
{
"cve": "CVE-2025-46923",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46923"
},
{
"cve": "CVE-2025-46924",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46924"
},
{
"cve": "CVE-2025-46926",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46926"
},
{
"cve": "CVE-2025-46927",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46927"
},
{
"cve": "CVE-2025-46929",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46929"
},
{
"cve": "CVE-2025-46930",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46930"
},
{
"cve": "CVE-2025-46931",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46931"
},
{
"cve": "CVE-2025-46933",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46933"
},
{
"cve": "CVE-2025-46934",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46934"
},
{
"cve": "CVE-2025-46935",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46935"
},
{
"cve": "CVE-2025-46939",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46939"
},
{
"cve": "CVE-2025-46940",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46940"
},
{
"cve": "CVE-2025-46941",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46941"
},
{
"cve": "CVE-2025-46942",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46942"
},
{
"cve": "CVE-2025-46943",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46943"
},
{
"cve": "CVE-2025-46944",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46944"
},
{
"cve": "CVE-2025-46945",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46945"
},
{
"cve": "CVE-2025-46946",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46946"
},
{
"cve": "CVE-2025-46947",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46947"
},
{
"cve": "CVE-2025-46948",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46948"
},
{
"cve": "CVE-2025-46949",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46949"
},
{
"cve": "CVE-2025-46950",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46950"
},
{
"cve": "CVE-2025-46951",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46951"
},
{
"cve": "CVE-2025-46952",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46952"
},
{
"cve": "CVE-2025-46953",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46953"
},
{
"cve": "CVE-2025-46954",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46954"
},
{
"cve": "CVE-2025-46955",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46955"
},
{
"cve": "CVE-2025-46956",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46956"
},
{
"cve": "CVE-2025-46957",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46957"
},
{
"cve": "CVE-2025-46958",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46958"
},
{
"cve": "CVE-2025-46959",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46959"
},
{
"cve": "CVE-2025-46960",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46960"
},
{
"cve": "CVE-2025-46963",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46963"
},
{
"cve": "CVE-2025-46964",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46964"
},
{
"cve": "CVE-2025-46965",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46965"
},
{
"cve": "CVE-2025-46966",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46966"
},
{
"cve": "CVE-2025-46967",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46967"
},
{
"cve": "CVE-2025-46968",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46968"
},
{
"cve": "CVE-2025-46970",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46970"
},
{
"cve": "CVE-2025-46971",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46971"
},
{
"cve": "CVE-2025-46972",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46972"
},
{
"cve": "CVE-2025-46973",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46973"
},
{
"cve": "CVE-2025-46974",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46974"
},
{
"cve": "CVE-2025-46975",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46975"
},
{
"cve": "CVE-2025-46976",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46976"
},
{
"cve": "CVE-2025-46977",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46977"
},
{
"cve": "CVE-2025-46978",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46978"
},
{
"cve": "CVE-2025-46979",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46979"
},
{
"cve": "CVE-2025-46981",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46981"
},
{
"cve": "CVE-2025-46982",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46982"
},
{
"cve": "CVE-2025-46983",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46983"
},
{
"cve": "CVE-2025-46984",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46984"
},
{
"cve": "CVE-2025-46985",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46985"
},
{
"cve": "CVE-2025-46986",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46986"
},
{
"cve": "CVE-2025-46987",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46987"
},
{
"cve": "CVE-2025-46988",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46988"
},
{
"cve": "CVE-2025-46989",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46989"
},
{
"cve": "CVE-2025-46990",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46990"
},
{
"cve": "CVE-2025-46991",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46991"
},
{
"cve": "CVE-2025-46992",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46992"
},
{
"cve": "CVE-2025-46993",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46993"
},
{
"cve": "CVE-2025-46995",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46995"
},
{
"cve": "CVE-2025-46996",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46996"
},
{
"cve": "CVE-2025-46997",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46997"
},
{
"cve": "CVE-2025-46999",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-46999"
},
{
"cve": "CVE-2025-47000",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47000"
},
{
"cve": "CVE-2025-47001",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47001"
},
{
"cve": "CVE-2025-47002",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47002"
},
{
"cve": "CVE-2025-47003",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47003"
},
{
"cve": "CVE-2025-47004",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47004"
},
{
"cve": "CVE-2025-47005",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47005"
},
{
"cve": "CVE-2025-47006",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47006"
},
{
"cve": "CVE-2025-47007",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47007"
},
{
"cve": "CVE-2025-47008",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47008"
},
{
"cve": "CVE-2025-47010",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47010"
},
{
"cve": "CVE-2025-47011",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47011"
},
{
"cve": "CVE-2025-47012",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47012"
},
{
"cve": "CVE-2025-47013",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47013"
},
{
"cve": "CVE-2025-47014",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47014"
},
{
"cve": "CVE-2025-47015",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47015"
},
{
"cve": "CVE-2025-47016",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47016"
},
{
"cve": "CVE-2025-47017",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47017"
},
{
"cve": "CVE-2025-47019",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47019"
},
{
"cve": "CVE-2025-47020",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47020"
},
{
"cve": "CVE-2025-47021",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47021"
},
{
"cve": "CVE-2025-47022",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47022"
},
{
"cve": "CVE-2025-47025",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47025"
},
{
"cve": "CVE-2025-47026",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47026"
},
{
"cve": "CVE-2025-47027",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47027"
},
{
"cve": "CVE-2025-47029",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47029"
},
{
"cve": "CVE-2025-47030",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47030"
},
{
"cve": "CVE-2025-47031",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47031"
},
{
"cve": "CVE-2025-47032",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47032"
},
{
"cve": "CVE-2025-47033",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47033"
},
{
"cve": "CVE-2025-47034",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47034"
},
{
"cve": "CVE-2025-47035",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47035"
},
{
"cve": "CVE-2025-47036",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47036"
},
{
"cve": "CVE-2025-47037",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47037"
},
{
"cve": "CVE-2025-47038",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47038"
},
{
"cve": "CVE-2025-47039",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47039"
},
{
"cve": "CVE-2025-47040",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47040"
},
{
"cve": "CVE-2025-47041",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47041"
},
{
"cve": "CVE-2025-47042",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47042"
},
{
"cve": "CVE-2025-47044",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47044"
},
{
"cve": "CVE-2025-47045",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47045"
},
{
"cve": "CVE-2025-47047",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47047"
},
{
"cve": "CVE-2025-47048",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47048"
},
{
"cve": "CVE-2025-47049",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47049"
},
{
"cve": "CVE-2025-47050",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47050"
},
{
"cve": "CVE-2025-47051",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47051"
},
{
"cve": "CVE-2025-47052",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47052"
},
{
"cve": "CVE-2025-47053",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47053"
},
{
"cve": "CVE-2025-47055",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47055"
},
{
"cve": "CVE-2025-47056",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47056"
},
{
"cve": "CVE-2025-47057",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47057"
},
{
"cve": "CVE-2025-47060",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47060"
},
{
"cve": "CVE-2025-47061",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47061"
},
{
"cve": "CVE-2025-47062",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47062"
},
{
"cve": "CVE-2025-47063",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47063"
},
{
"cve": "CVE-2025-47065",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47065"
},
{
"cve": "CVE-2025-47066",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47066"
},
{
"cve": "CVE-2025-47067",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47067"
},
{
"cve": "CVE-2025-47068",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47068"
},
{
"cve": "CVE-2025-47069",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47069"
},
{
"cve": "CVE-2025-47070",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47070"
},
{
"cve": "CVE-2025-47071",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47071"
},
{
"cve": "CVE-2025-47072",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47072"
},
{
"cve": "CVE-2025-47073",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47073"
},
{
"cve": "CVE-2025-47074",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47074"
},
{
"cve": "CVE-2025-47075",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47075"
},
{
"cve": "CVE-2025-47076",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47076"
},
{
"cve": "CVE-2025-47077",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47077"
},
{
"cve": "CVE-2025-47078",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47078"
},
{
"cve": "CVE-2025-47079",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47079"
},
{
"cve": "CVE-2025-47080",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47080"
},
{
"cve": "CVE-2025-47081",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47081"
},
{
"cve": "CVE-2025-47082",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47082"
},
{
"cve": "CVE-2025-47083",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47083"
},
{
"cve": "CVE-2025-47084",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47084"
},
{
"cve": "CVE-2025-47085",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47085"
},
{
"cve": "CVE-2025-47086",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47086"
},
{
"cve": "CVE-2025-47087",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47087"
},
{
"cve": "CVE-2025-47088",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47088"
},
{
"cve": "CVE-2025-47089",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47089"
},
{
"cve": "CVE-2025-47090",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47090"
},
{
"cve": "CVE-2025-47091",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47091"
},
{
"cve": "CVE-2025-47092",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47092"
},
{
"cve": "CVE-2025-47093",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47093"
},
{
"cve": "CVE-2025-47094",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47094"
},
{
"cve": "CVE-2025-47095",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47095"
},
{
"cve": "CVE-2025-47096",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47096"
},
{
"cve": "CVE-2025-47100",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47100"
},
{
"cve": "CVE-2025-47102",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47102"
},
{
"cve": "CVE-2025-47113",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47113"
},
{
"cve": "CVE-2025-47114",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47114"
},
{
"cve": "CVE-2025-47115",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47115"
},
{
"cve": "CVE-2025-47116",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47116"
},
{
"cve": "CVE-2025-47117",
"product_status": {
"known_affected": [
"T044488",
"T044487"
]
},
"release_date": "2025-06-10T22:00:00.000+00:00",
"title": "CVE-2025-47117"
}
]
}
GHSA-4GRX-M9VQ-M87H
Vulnerability from github – Published: 2025-06-11 00:30 – Updated: 2025-06-11 00:30
VLAI?
Details
Adobe Experience Manager versions 6.5.22 and earlier are affected by an Improper Authorization vulnerability that could result in Privilege escalation. A low privileged attacker could leverage this vulnerability to bypass security measures and gain unauthorized access. Exploitation of this issue requires user interaction. A successful attacker can abuse this to achieve session takeover, increasing the confidentiality and integrity impact as high.
Severity ?
8.7 (High)
{
"affected": [],
"aliases": [
"CVE-2025-46840"
],
"database_specific": {
"cwe_ids": [
"CWE-285"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2025-06-10T23:15:24Z",
"severity": "HIGH"
},
"details": "Adobe Experience Manager versions 6.5.22 and earlier are affected by an Improper Authorization vulnerability that could result in Privilege escalation. A low privileged attacker could leverage this vulnerability to bypass security measures and gain unauthorized access. Exploitation of this issue requires user interaction. A successful attacker can abuse this to achieve session takeover, increasing the confidentiality and integrity impact as high.",
"id": "GHSA-4grx-m9vq-m87h",
"modified": "2025-06-11T00:30:36Z",
"published": "2025-06-11T00:30:36Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-46840"
},
{
"type": "WEB",
"url": "https://helpx.adobe.com/security/products/experience-manager/apsb25-48.html"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N",
"type": "CVSS_V3"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…