Home

Description

The XWiki blog application allows users of the XWiki platform to create and manage blog posts. Versions prior to 9.15.7 are vulnerable to Stored Cross-Site Scripting (XSS) via the Blog Post Title. The vulnerability arises because the post title is injected directly into the HTML <title> tag without proper escaping. An attacker with permissions to create or edit blog posts can inject malicious JavaScript into the title field. This script will execute in the browser of any user (including administrators) who views the blog post. This leads to potential session hijacking or privilege escalation. The vulnerability has been patched in the blog application version 9.15.7 by adding missing escaping. No known workarounds are available.

PUBLISHED Reserved 2025-11-21 | Published 2026-03-04 | Updated 2026-03-05 | Assigner GitHub_M




HIGH: 8.6CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

Problem types

CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Product status

< 9.15.7
affected

References

github.com/...n-blog/security/advisories/GHSA-h2xq-h7f9-vh6c

github.com/...ommit/cca87f0a0edc2e7e049d46d51f4a4d8f78b714ba

jira.xwiki.org/browse/BLOG-245

cve.org (CVE-2025-66024)

nvd.nist.gov (CVE-2025-66024)

Download JSON