CVE-2025-58365
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-09-08

Last updated on: 2025-09-09

Assigner: GitHub, Inc.

Description
The XWiki blog application allows users of the XWiki platform to create and manage blog posts. Prior to version 9.14, the blog application in XWiki allowed remote code execution for any user who has edit right on any page. Normally, these are all logged-in users as they can edit their own user profile. For an exploit, it is sufficient to add an object of type `Blog.BlogPostClass` to any page and to add some script macro with the exploit code to the "Content" field of that object. The vulnerability has been patched in the blog application version 9.14 by executing the content of blog posts with the rights of the appropriate author. No known workarounds are available.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-09-08
Last Modified
2025-09-09
Generated
2026-05-07
AI Q&A
2025-09-09
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
xwiki application-blog 9.14
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-95 The product receives input from an upstream component, but it does not neutralize or incorrectly neutralizes code syntax before using the input in a dynamic evaluation call (e.g. "eval").
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability in the XWiki blog application allows any user with edit rights on any page (typically all logged-in users) to execute remote code. An attacker can exploit this by adding a Blog.BlogPostClass object to a page and inserting malicious script code into the Content field of that object. This enables the attacker to run arbitrary code remotely. The issue was fixed in version 9.14 by ensuring blog post content executes with the rights of the author, preventing unauthorized code execution.


How can this vulnerability impact me? :

This vulnerability can allow an attacker with edit rights to execute arbitrary code on the XWiki platform remotely. This could lead to unauthorized actions such as data theft, data manipulation, system compromise, or further attacks within the environment where XWiki is deployed.


What immediate steps should I take to mitigate this vulnerability?

Upgrade the XWiki blog application to version 9.14 or later, where the vulnerability has been patched by executing blog post content with the rights of the appropriate author. No known workarounds are available, so applying the update is the immediate mitigation step.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart