Advisory Database
  • Advisories
  • Dependency Scanning
  1. maven
  2. ›
  3. org.xwiki.contrib.blog/application-blog-ui
  4. ›
  5. CVE-2025-58365

CVE-2025-58365: XWiki Blog Application: Privilege Escalation (PR) from account through blog content

September 8, 2025

The blog application in XWiki allowed remote code execution for any user who has edit right on any page. Normally, these are all logged-in users as they can edit their own user profile. To exploit, it is sufficient to add an object of type Blog.BlogPostClass to any page and to add some script macro with the exploit code to the “Content” field of that object.

References

  • github.com/advisories/GHSA-gwj6-xpfg-pxwr
  • github.com/xwiki-contrib/application-blog
  • github.com/xwiki-contrib/application-blog/commit/b98ab6f17da3029576f42d12b4442cd555c7e0b4
  • github.com/xwiki-contrib/application-blog/security/advisories/GHSA-gwj6-xpfg-pxwr
  • jira.xwiki.org/browse/BLOG-191
  • nvd.nist.gov/vuln/detail/CVE-2025-58365

Code Behaviors & Features

Detect and mitigate CVE-2025-58365 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 9.14

Fixed versions

  • 9.14

Solution

Upgrade to version 9.14 or above.

Weakness

  • CWE-250: Execution with Unnecessary Privileges
  • CWE-94: Improper Control of Generation of Code ('Code Injection')

Source file

maven/org.xwiki.contrib.blog/application-blog-ui/CVE-2025-58365.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 10 Sep 2025 00:18:45 +0000.