CVE-2024-23725
Description
Ghost before 5.76.0 allows XSS via a post excerpt in excerpt.js. An XSS payload can be rendered in post summaries.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Ghost versions before 5.76.0 are vulnerable to stored XSS via post excerpts, allowing an attacker to inject arbitrary scripts into post summaries.
Vulnerability
Overview
CVE-2024-23725 describes a stored cross-site scripting vulnerability in Ghost, an open-source publishing platform. The flaw resides in the excerpt.js module, where post excerpts are rendered without proper output encoding. In versions prior to 5.76.0, an attacker who can create or edit posts (an authenticated author or editor) can inject a malicious HTML/JavaScript payload into the excerpt field. When the summary is displayed, the browser executes the attacker's script, leading to XSS [1][3].
Exploitation
Prerequisites
Exploitation requires an authenticated user with the ability to create or edit posts (typically authors or editors). The attacker supplies a crafted excerpt containing JavaScript, such as ``. Upon saving the post, the payload is stored and later rendered unescaped in any view that shows post summaries (e.g., blog index, search results, RSS feeds). No additional user interaction beyond viewing the affected summary is needed for the script to fire [2][3].
Impact
Assessment
A successful XSS attack can lead to session hijacking, account takeover, credential theft, or redirection to malicious sites. Since Ghost is a content management system, an attacker could steal administrative tokens, modify site content, or deploy further attacks against readers. The vulnerability is classified as moderate severity but may have high impact depending on the deployment context [1].
Mitigation
The issue was fixed in Ghost version 5.76.0, released on the same day as the CVE publication. The patch uses the Lodash escape function to sanitize excerpt output, ensuring that HTML entities are safely encoded [3][4]. Users should upgrade immediately; no workaround is available for older versions. The vulnerability is not listed in CISA's Known Exploited Vulnerabilities catalog as of this writing.
AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
ghostnpm | < 5.76.0 | 5.76.0 |
Affected products
3- Ghost/Ghostdescription
- osv-coords2 versions
< 5.76.0+ 1 more
- (no CPE)range: < 5.76.0
- (no CPE)range: < 5.76.0
Patches
164d67717f7c7Vulnerability mechanics
Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
5News mentions
0No linked articles in our index yet.