In cybersecurity, there is no truce — and this time it’s Adobe’s turn. The company has just released emergency patches for two critical vulnerabilities in Adobe Experience Manager (AEM) Forms on JEE, after public exploits were disclosed that allow remote code execution (RCE) on vulnerable servers without authentication.
At TecnetOne, we want to explain what happened, why these flaws are so severe, and most importantly, what you should do to protect your systems immediately.
The vulnerabilities have been identified as CVE-2025-54253 and CVE-2025-54254, both with very high risk levels:
Adobe has already published a security update addressing these flaws. If you manage servers running AEM Forms, you must install these updates right away.
Learn more: Patch Management Lifecycle: What It Is and How to Apply It
Researchers Shubham Shah and Adam Kues from Searchlight Cyber reported these flaws to Adobe on April 28, 2025. In the same report, they disclosed a third vulnerability, CVE-2025-49533, which was patched on August 5.
However, the two most severe flaws (54253 and 54254) remained unpatched for over 90 days, giving attackers time to prepare exploits while systems were still exposed.
On July 29, the researchers published a technical report detailing how the vulnerabilities work and how they could be exploited — which accelerated Adobe’s emergency patch release.
To understand the severity, here’s how each vulnerability works:
Also of interest: Adobe Fixes 254 Critical Bugs in Its Main Products
If you use Adobe Experience Manager Forms on JEE, these flaws represent a critical risk because they:
A successful attack could result in:
At TecnetOne, we recommend taking immediate steps:
Review Adobe’s latest security bulletin and apply all updates and hotfixes without delay.
Disable any development modes or debugging configurations that may expose parameters.
Implement tools that detect anomalous behavior in real time to catch exploitation attempts early.
Avoid exposing services like the /adminui module to the internet unless absolutely necessary.
Ensure administrators understand these vulnerabilities and are prepared to respond quickly.
Regular security assessments help detect vulnerabilities before attackers do.
This incident highlights a critical lesson: waiting is never an option.
Although these flaws were reported in April, the patch delay left hundreds of organizations exposed.
The only way to minimize risk is with a proactive approach:
The vulnerabilities discovered in Adobe AEM Forms are a stark reminder of how fragile complex systems can be. If you use this platform, you must act now.
At TecnetOne, we can help you deploy patches, harden configurations, and roll out next-generation security solutions to protect your business from zero-day exploits and remote code execution attacks.
Remember: every day without securing your infrastructure is an opportunity for attackers. Prevention not only avoids financial loss — it also safeguards your customers’ trust and your company’s reputation.