Ad

CVE-2025-66024

HIGH CVSS 4.0: 8.6 EPSS 0.56%
Updated Mar 05, 2026
Parameter Value
CVSS 8.6 (HIGH)
Affected Versions before 9.15.7
Type CWE-79 (Cross-Site Scripting (XSS))
Public PoC No

The XWiki blog application allows users of the XWiki platform to create and manage blog posts. Versions prior to 9.15.7 are vulnerable to Stored Cross-Site Scripting (XSS) via the Blog Post Title. The vulnerability arises because the post title is injected directly into the HTML <title> tag without proper escaping.

An attacker with permissions to create or edit blog posts can inject malicious JavaScript into the title field. This script will execute in the browser of any user (including administrators) who views the blog post. This leads to potential session hijacking or privilege escalation.

The vulnerability has been patched in the blog application version 9.15.7 by adding missing escaping. No known workarounds are available.

Attack Parameters

Attack Vector
Network
Can be exploited remotely
Attack Complexity
Low
Easy to exploit
Attack Requirements
None
No additional conditions
Privileges Required
Low
Basic privileges needed
User Interaction
Passive
Minimal interaction

Impact Assessment

Confidentiality
High
Complete data leak
Integrity
High
Complete data modification
Availability
High
Complete denial of service

CVSS Vector v4.0