Cyber Posture

CVE-2025-66024

CriticalPublic PoCUpdated

Published: 04 March 2026

Published
04 March 2026
Modified
21 April 2026
KEV Added
Patch
CVSS Score 9.0 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H
EPSS Score 0.0099 77.1th percentile
Risk Priority 19 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-66024 is a critical-severity Cross-site Scripting (CWE-79) vulnerability in Xwiki Blog Application. Its CVSS base score is 9.0 (Critical).

Operationally, exploitation aligns with the MITRE ATT&CK technique Taint Shared Content (T1080); ranked in the top 22.9% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-15 (Information Output Filtering).

Threat & Defense at a Glance

What attackers do: exploitation maps to Taint Shared Content (T1080). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Requires output filtering and escaping of user-supplied blog post titles before insertion into HTML elements like the <title> tag, directly preventing stored XSS execution.

prevent

Mandates validation of inputs such as blog post titles to reject or sanitize malicious JavaScript payloads before storage, blocking the root cause of the stored XSS vulnerability.

prevent

Ensures timely identification, reporting, and patching of flaws like the unescaped title injection in XWiki blog versions prior to 9.15.7, eliminating the vulnerability through remediation.

MITRE ATT&CK Enterprise TechniquesAI

T1080 Taint Shared Content Lateral Movement
Why these techniques?

Stored XSS vulnerability allows low-privilege attackers to inject malicious JavaScript into blog post titles, which executes in the context of any viewer's browser (including admins), directly enabling T1080: Taint Shared Content.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

NVD Description

The XWiki blog application allows users of the XWiki platform to create and manage blog posts. Versions prior to 9.15.7 are vulnerable to Stored Cross-Site Scripting (XSS) via the Blog Post Title. The vulnerability arises because the post title is…

more

injected directly into the HTML <title> tag without proper escaping. An attacker with permissions to create or edit blog posts can inject malicious JavaScript into the title field. This script will execute in the browser of any user (including administrators) who views the blog post. This leads to potential session hijacking or privilege escalation. The vulnerability has been patched in the blog application version 9.15.7 by adding missing escaping. No known workarounds are available.

Deeper analysisAI

CVE-2025-66024 is a stored cross-site scripting (XSS) vulnerability, classified under CWE-79, affecting the XWiki blog application in versions prior to 9.15.7. This component enables users of the XWiki platform to create and manage blog posts. The issue stems from the blog post title being injected directly into the HTML <title> tag without proper escaping, allowing malicious JavaScript to be embedded in the title field.

An attacker with low-privilege access to create or edit blog posts (PR:L) can exploit this over the network (AV:N) by injecting JavaScript into a post title. The payload requires user interaction to view the affected blog post (UI:R) but executes in the context of any viewer, including administrators, due to the changed scope (S:C). Successful exploitation can result in high confidentiality, integrity, and availability impacts (C:H/I:H/A:H), enabling session hijacking or privilege escalation, as scored at CVSS 9.0 (CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H).

The vulnerability was addressed in blog application version 9.15.7 through the addition of missing escaping for the title field, as detailed in the patch commit at https://github.com/xwiki-contrib/application-blog/commit/cca87f0a0edc2e7e049d46d51f4a4d8f78b714ba, the GitHub security advisory at https://github.com/xwiki-contrib/application-blog/security/advisories/GHSA-h2xq-h7f9-vh6c, and the associated JIRA ticket at https://jira.xwiki.org/browse/BLOG-245. No workarounds are available.

Details

CWE(s)

Affected Products

xwiki
blog application
≤ 9.15.7

CVEs Like This One

CVE-2025-51991Same vendor: Xwiki
CVE-2025-53835Same vendor: Xwiki
CVE-2025-32429Same vendor: Xwiki
CVE-2026-40104Same vendor: Xwiki
CVE-2025-29926Same vendor: Xwiki
CVE-2025-54385Same vendor: Xwiki
CVE-2026-33229Same vendor: Xwiki
CVE-2025-65036Same vendor: Xwiki
CVE-2025-55747Same vendor: Xwiki
CVE-2025-29924Same vendor: Xwiki

References