Adobe Experience Manager (AEM) Querybuilder Internal Path Read

medium Web App Scanning Plugin ID 115057

Synopsis

Adobe Experience Manager (AEM) Querybuilder Internal Path Read

Description

The remote Adobe Experience Manager (AEM) server is configured to allow unauthenticated users to access internal paths using the Querybuilder endpoint. This may allow an attacker to read sensitive files from the server.

The Querybuilder endpoint is typically located at /bin/querybuilder.json and allows users to perform searches on the AEM repository. By specifying certain parameters, an attacker can potentially access internal paths that should not be publicly accessible.

Solution

Restrict access to the endpoint using a .htaccess file, limiting access to known IP Addresses

See Also

https://speakerdeck.com/0ang3el/aem-hacker-approaching-adobe-experience-manager-webapps-in-bug-bounty-programs?slide=91

Plugin Details

Severity: Medium

ID: 115057

Type: remote

Published: 12/4/2025

Updated: 12/4/2025

Scan Template: basic, full, pci, scan

Risk Information

VPR

Risk Factor: Low

Score: 1.4

CVSS v2

Risk Factor: Medium

Base Score: 5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N

CVSS Score Source: Tenable

CVSS v3

Risk Factor: Medium

Base Score: 5.3

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

CVSS Score Source: Tenable

CVSS v4

Risk Factor: Medium

Base Score: 6.9

Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N

CVSS Score Source: Tenable

Reference Information