XWiki Blog Application: Privilege Escalation (PR) from account through blog content
        
  High severity
        
          GitHub Reviewed
      
        Published
          Sep 8, 2025 
          in
          
            xwiki-contrib/application-blog
          
          •
          Updated Sep 10, 2025 
      
  
Package
Affected versions
< 9.14
  Patched versions
9.14
  Description
        Published to the GitHub Advisory Database
      Sep 8, 2025 
    
  
        Reviewed
      Sep 8, 2025 
    
  
        Published by the National Vulnerability Database
      Sep 8, 2025 
    
  
        Last updated
      Sep 10, 2025 
    
  
Impact
The blog application in XWiki allowed remote code execution for any user who has edit right on any page. Normally, these are all logged-in users as they can edit their own user profile. To exploit, it is sufficient to add an object of type
Blog.BlogPostClassto any page and to add some script macro with the exploit code to the "Content" field of that object.Patches
The vulnerability has been patched in the blog application version 9.14 by executing the content of blog posts with the rights of the appropriate author.
Workarounds
We're not aware of any workarounds.
Resources
References