Monitor vulnerabilities like this one.
Sign up free to get alerted when software you use is affected.
8.6
XWiki Blog Application vulnerable to malicious blog post titles
CVE-2025-66024
GHSA-h2xq-h7f9-vh6c
Summary
An attacker can inject malicious code into a blog post title, allowing them to take control of a user's session or escalate their privileges. This vulnerability exists in older versions of the XWiki Blog Application and has been fixed in version 9.15.7. To protect your system, update to the latest version of the application.
What to do
- Update xwiki org.xwiki.contrib.blog:application-blog-ui to version 9.15.7.
Affected software
| Vendor | Product | Affected versions | Fix available |
|---|---|---|---|
| xwiki | org.xwiki.contrib.blog:application-blog-ui | <= 9.15.7 | 9.15.7 |
Original title
XWiki Blog Application home page vulnerable to Stored XSS via Post Title
Original description
### Impact
The Blog Application is vulnerable to Stored Cross-Site Scripting (XSS) via the Blog Post Title. The vulnerability arises because the post title is injected directly into the HTML <title> tag without proper escaping.
An attacker with permissions to create or edit blog posts can inject malicious JavaScript into the title field. This script will execute in the browser of any user (including administrators) who views the blog post. This leads to potential session hijacking or privilege escalation.
To reproduce:
* Log in as a user with rights to create blog posts.
* Create a new blog post.
* In the Title field, insert the following payload designed to break out of the title tag: ```</title><script>alert('XSS in title blog')</script>```
* Save (Publish) the post.
* View the post in the blog home page
### Patches
The vulnerability has been patched in the blog application version 9.15.7 by adding missing escaping.
### Workarounds
XWiki Blog Application maintainers are not aware of any workarounds.
### Resources
* https://jira.xwiki.org/browse/BLOG-245
* https://github.com/xwiki-contrib/application-blog/commit/cca87f0a0edc2e7e049d46d51f4a4d8f78b714ba
### Attribution
Łukasz Rybak reported this vulnerability.
The Blog Application is vulnerable to Stored Cross-Site Scripting (XSS) via the Blog Post Title. The vulnerability arises because the post title is injected directly into the HTML <title> tag without proper escaping.
An attacker with permissions to create or edit blog posts can inject malicious JavaScript into the title field. This script will execute in the browser of any user (including administrators) who views the blog post. This leads to potential session hijacking or privilege escalation.
To reproduce:
* Log in as a user with rights to create blog posts.
* Create a new blog post.
* In the Title field, insert the following payload designed to break out of the title tag: ```</title><script>alert('XSS in title blog')</script>```
* Save (Publish) the post.
* View the post in the blog home page
### Patches
The vulnerability has been patched in the blog application version 9.15.7 by adding missing escaping.
### Workarounds
XWiki Blog Application maintainers are not aware of any workarounds.
### Resources
* https://jira.xwiki.org/browse/BLOG-245
* https://github.com/xwiki-contrib/application-blog/commit/cca87f0a0edc2e7e049d46d51f4a4d8f78b714ba
### Attribution
Łukasz Rybak reported this vulnerability.
nvd CVSS4.0
8.6
Vulnerability type
CWE-79
Cross-site Scripting (XSS)
- https://github.com/xwiki-contrib/application-blog/commit/cca87f0a0edc2e7e049d46d...
- https://github.com/xwiki-contrib/application-blog/security/advisories/GHSA-h2xq-...
- https://jira.xwiki.org/browse/BLOG-245
- https://nvd.nist.gov/vuln/detail/CVE-2025-66024
- https://github.com/advisories/GHSA-h2xq-h7f9-vh6c
Published: 4 Mar 2026 · Updated: 13 Mar 2026 · First seen: 6 Mar 2026