GHSA-H2XQ-H7F9-VH6C
Vulnerability from github – Published: 2026-03-04 18:16 – Updated: 2026-03-05 15:26
VLAI?
Summary
XWiki Blog Application home page vulnerable to Stored XSS via Post Title
Details
Impact
The Blog Application is vulnerable to Stored Cross-Site Scripting (XSS) via the Blog Post Title. The vulnerability arises because the post title is injected directly into the HTML tag without proper escaping.
An attacker with permissions to create or edit blog posts can inject malicious JavaScript into the title field. This script will execute in the browser of any user (including administrators) who views the blog post. This leads to potential session hijacking or privilege escalation.
To reproduce:
- Log in as a user with rights to create blog posts.
- Create a new blog post.
- In the Title field, insert the following payload designed to break out of the title tag:
</title><script>alert('XSS in title blog')</script> - Save (Publish) the post.
- View the post in the blog home page
Patches
The vulnerability has been patched in the blog application version 9.15.7 by adding missing escaping.
Workarounds
XWiki Blog Application maintainers are not aware of any workarounds.
Resources
- https://jira.xwiki.org/browse/BLOG-245
- https://github.com/xwiki-contrib/application-blog/commit/cca87f0a0edc2e7e049d46d51f4a4d8f78b714ba
Attribution
Łukasz Rybak reported this vulnerability.
Severity ?
{
"affected": [
{
"package": {
"ecosystem": "Maven",
"name": "org.xwiki.contrib.blog:application-blog-ui"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "9.15.7"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"aliases": [
"CVE-2025-66024"
],
"database_specific": {
"cwe_ids": [
"CWE-79"
],
"github_reviewed": true,
"github_reviewed_at": "2026-03-04T18:16:14Z",
"nvd_published_at": "2026-03-04T22:16:11Z",
"severity": "HIGH"
},
"details": "### Impact\n\nThe Blog Application is vulnerable to Stored Cross-Site Scripting (XSS) via the Blog Post Title. The vulnerability arises because the post title is injected directly into the HTML \u003ctitle\u003e tag without proper escaping.\n\nAn attacker with permissions to create or edit blog posts can inject malicious JavaScript into the title field. This script will execute in the browser of any user (including administrators) who views the blog post. This leads to potential session hijacking or privilege escalation.\n\nTo reproduce:\n\n* Log in as a user with rights to create blog posts.\n* Create a new blog post.\n* In the Title field, insert the following payload designed to break out of the title tag: ```\u003c/title\u003e\u003cscript\u003ealert(\u0027XSS in title blog\u0027)\u003c/script\u003e```\n* Save (Publish) the post.\n* View the post in the blog home page\n\n### Patches\nThe vulnerability has been patched in the blog application version 9.15.7 by adding missing escaping.\n\n### Workarounds\nXWiki Blog Application maintainers are not aware of any workarounds.\n\n### Resources\n* https://jira.xwiki.org/browse/BLOG-245\n* https://github.com/xwiki-contrib/application-blog/commit/cca87f0a0edc2e7e049d46d51f4a4d8f78b714ba\n\n### Attribution\n\n\u0141ukasz Rybak reported this vulnerability.",
"id": "GHSA-h2xq-h7f9-vh6c",
"modified": "2026-03-05T15:26:15Z",
"published": "2026-03-04T18:16:14Z",
"references": [
{
"type": "WEB",
"url": "https://github.com/xwiki-contrib/application-blog/security/advisories/GHSA-h2xq-h7f9-vh6c"
},
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-66024"
},
{
"type": "WEB",
"url": "https://github.com/xwiki-contrib/application-blog/commit/cca87f0a0edc2e7e049d46d51f4a4d8f78b714ba"
},
{
"type": "PACKAGE",
"url": "https://github.com/xwiki-contrib/application-blog"
},
{
"type": "WEB",
"url": "https://jira.xwiki.org/browse/BLOG-245"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"type": "CVSS_V4"
}
],
"summary": "XWiki Blog Application home page vulnerable to Stored XSS via Post Title"
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…