Rule Category

SERVER-WEBAPP -- Snort has detected traffic exploiting vulnerabilities in web based applications on servers.

Alert Message

SERVER-WEBAPP Adobe Experience Manager remote code execution attempt

Rule Explanation

This rule looks for specially crafted inbound HTTP requests to the "/adminui/" endpoint on Adobe Experience Manager web applications that attempt to invoke the Struts2 devMode feature to execute arbitrary OGNL expressions. Attackers have been observed exploiting an authentication bypass vulnerability (CVE-2025-54253) to be able to invoke devMode functionality.

What To Look For

This rule fires on attempts to exploit a remote code execution vulnerability in Adobe Experience Manager web applications.

Known Usage

Attacks/Scans seen in the wild

False Positives

No known false positives

Contributors

Cisco Talos Intelligence Group

Rule Groups

Rule Categories::Server::Web Applications

MITRE::ATT&CK Framework::Enterprise::Initial Access::Exploit Public-Facing Application

CVE

Additional Links

Rule Vulnerability

N/A

Not Applicable

CVE Additional Information

This product uses data from the NVD API but is not endorsed or certified by the NVD.
CVE-2025-54253
Loading description