XWiki Blog Application home page vulnerable to Stored XSS via Post Title
High severity
GitHub Reviewed
Published
Mar 4, 2026
in
xwiki-contrib/application-blog
•
Updated Mar 5, 2026
Package
Affected versions
< 9.15.7
Patched versions
9.15.7
Description
Published to the GitHub Advisory Database
Mar 4, 2026
Reviewed
Mar 4, 2026
Published by the National Vulnerability Database
Mar 4, 2026
Last updated
Mar 5, 2026
Impact
The Blog Application is vulnerable to Stored Cross-Site Scripting (XSS) via the Blog Post Title. The vulnerability arises because the post title is injected directly into the HTML <title> tag without proper escaping.
An attacker with permissions to create or edit blog posts can inject malicious JavaScript into the title field. This script will execute in the browser of any user (including administrators) who views the blog post. This leads to potential session hijacking or privilege escalation.
To reproduce:
</title><script>alert('XSS in title blog')</script>Patches
The vulnerability has been patched in the blog application version 9.15.7 by adding missing escaping.
Workarounds
XWiki Blog Application maintainers are not aware of any workarounds.
Resources
Attribution
Łukasz Rybak reported this vulnerability.
References