CrowdSec
10/10CrowdSec Score

Adobe Experience Manager - SSRF (CVE-2025-54249)

Published on09-09-2025
First seen on16-10-2025

46Exploiting IPs reported

Adobe Experience Manager versions 6.5.23.0 and earlier are affected by a Server-Side Request Forgery (SSRF) vulnerability that could result in a Security feature bypass. A low-privileged attacker could leverage this vulnerability to manipulate server-side requests and bypass security controls allowing unauthorized read access.

CrowdSec analysis

CVE-2025-54249 is a Server-Side Request Forgery (SSRF) vulnerability in Adobe Experience Manager versions 6.5.23.0 and earlier, which allows low-privileged attackers to manipulate server-side requests and bypass security controls. Exploiting this flaw could enable unauthorized read access to sensitive internal resources, potentially exposing confidential information to threat actors.

CrowdSec has been tracking this vulnerability and its exploits since 15th of October 2025.

CrowdSec network observations suggest that most exploitation of CVE-2025-54249 involves focused reconnaissance to identify viable targets. Attackers typically tailor their campaigns based on system exposure and configuration. It is unlikely that a given attack is accidental. Additionally, according to week-over-week analysis by CrowdSec, exploitation of CVE-2025-54249 is surging. Attack volumes are spiking well above historical norms, indicating widespread and escalating interest from threat actors. CVE-2025-54249 is currently experiencing high visibility and active exploitation across the internet.

Attackers exploit this vulnerability by sending crafted POST requests to endpoints such as /services/accesstoken/verify with a manipulated auth_url parameter, enabling SSRF attempts against internal or external resources.

Exploitation

Get real-time information about exploitation attempts and actors involved.

Detected IPs

Discover the IPs that targeted this vulnerability across the CrowdSec Network.

Common Weakness Enumeration (CWE)

Protection

Find out relevant information to protect your stack against this CVE.

Blocklist

With our advanced worldwide network detection, CrowdSec can provide a list of IPs known for exploiting the vulnerability.

To increase your protection against this CVE, block exploitation attempts with this list of identified actors.