XWiki Blog Application: Privilege Escalation (PR) from account through blog content
High severity
GitHub Reviewed
Published
Sep 8, 2025
in
xwiki-contrib/application-blog
•
Updated Sep 10, 2025
Package
Affected versions
< 9.14
Patched versions
9.14
Description
Published to the GitHub Advisory Database
Sep 8, 2025
Reviewed
Sep 8, 2025
Published by the National Vulnerability Database
Sep 8, 2025
Last updated
Sep 10, 2025
Impact
The blog application in XWiki allowed remote code execution for any user who has edit right on any page. Normally, these are all logged-in users as they can edit their own user profile. To exploit, it is sufficient to add an object of type
Blog.BlogPostClass
to any page and to add some script macro with the exploit code to the "Content" field of that object.Patches
The vulnerability has been patched in the blog application version 9.14 by executing the content of blog posts with the rights of the appropriate author.
Workarounds
We're not aware of any workarounds.
Resources
References