๐Ÿ” CVE Alert

CVE-2025-66024

UNKNOWN 0.0

XWiki Blog Application home page vulnerable to Stored XSS via Post Title

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

The XWiki blog application allows users of the XWiki platform to create and manage blog posts. Versions prior to 9.15.7 are vulnerable to Stored Cross-Site Scripting (XSS) via the Blog Post Title. The vulnerability arises because the post title is injected directly into the HTML <title> tag without proper escaping. An attacker with permissions to create or edit blog posts can inject malicious JavaScript into the title field. This script will execute in the browser of any user (including administrators) who views the blog post. This leads to potential session hijacking or privilege escalation. The vulnerability has been patched in the blog application version 9.15.7 by adding missing escaping. No known workarounds are available.

CWE CWE-79
Vendor xwiki-contrib
Product application-blog-ui
Published Mar 4, 2026
Last Updated Mar 5, 2026
Stay Ahead of the Next One

Get instant alerts for xwiki-contrib application-blog-ui

Be the first to know when new unknown vulnerabilities affecting xwiki-contrib application-blog-ui are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

xwiki-contrib / application-blog-ui
< 9.15.7

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/xwiki-contrib/application-blog/security/advisories/GHSA-h2xq-h7f9-vh6c github.com: https://github.com/xwiki-contrib/application-blog/commit/cca87f0a0edc2e7e049d46d51f4a4d8f78b714ba jira.xwiki.org: https://jira.xwiki.org/browse/BLOG-245