VYPR

Bitnami package

ghost

pkg:bitnami/ghost

Vulnerabilities (30)

  • CVE-2026-29784Mar 7, 2026
    affected >= 5.101.6, < 6.19.3fixed 6.19.3

    Ghost is a Node.js content management system. From version 5.101.6 to 6.19.2, incomplete CSRF protections around /session/verify made it possible to use OTCs in login sessions different from the requesting session. In some scenarios this might have made it easier for phishers to

  • CVE-2026-29053Mar 5, 2026
    affected >= 0.7.2, < 6.19.1fixed 6.19.1

    Ghost is a Node.js content management system. From version 0.7.2 to 6.19.0, specifically crafted malicious themes can execute arbitrary code on the server running Ghost. This issue has been patched in version 6.19.1.

  • CVE-2026-26980Feb 20, 2026
    affected >= 3.24.0, < 6.19.1fixed 6.19.1

    Ghost is a Node.js content management system. Versions 3.24.0 through 6.19.0 allow unauthenticated attackers to perform arbitrary reads from the database. This issue has been fixed in version 6.19.1.

  • CVE-2026-24778Jan 27, 2026
    affected >= 5.43.0, < 5.121.0fixed 5.121.0

    Ghost is an open source content management system. In Ghost versions 5.43.0 through 5.12.04 and 6.0.0 through 6.14.0, an attacker was able to craft a malicious link that, when accessed by an authenticated staff user or member, would execute JavaScript with the victim's permission

  • CVE-2026-22597LowJan 10, 2026
    affected >= 5.38.0, < 5.130.6fixed 5.130.6

    Ghost is a Node.js content management system. In versions 5.38.0 through 5.130.5 and 6.0.0 through 6.10.3, a vulnerability in Ghost’s media inliner mechanism allows staff users in possession of a valid authentication token for the Ghost Admin API to exfiltrate data from internal

  • CVE-2026-22596Jan 10, 2026
    affected >= 5.90.0, < 5.130.6fixed 5.130.6

    Ghost is a Node.js content management system. In versions 5.90.0 through 5.130.5 and 6.0.0 through 6.10.3, a vulnerability in Ghost's /ghost/api/admin/members/events endpoint allows users with authentication credentials for the Admin API to execute arbitrary SQL. This issue has b

  • CVE-2026-22595Jan 10, 2026
    affected >= 5.121.0, < 5.130.6fixed 5.130.6

    Ghost is a Node.js content management system. In versions 5.121.0 through 5.130.5 and 6.0.0 through 6.10.3, a vulnerability in Ghost's handling of Staff Token authentication allowed certain endpoints to be accessed that were only intended to be accessible via Staff Session authen

  • CVE-2026-22594Jan 10, 2026
    affected >= 5.105.0, < 5.130.6fixed 5.130.6

    Ghost is a Node.js content management system. In versions 5.105.0 through 5.130.5 and 6.0.0 through 6.10.3, a vulnerability in Ghost's 2FA mechanism allows staff users to skip email 2FA. This issue has been patched in versions 5.130.6 and 6.11.0.

  • CVE-2025-9862Sep 17, 2025
    affected >= 5.99.0, < 5.130.5fixed 5.130.5

    Server-Side Request Forgery (SSRF) vulnerability in Ghost allows an attacker to access internal resources.This issue affects Ghost: from 6.0.0 through 6.0.8, from 5.99.0 through 5.130.3.

  • CVE-2024-43409Aug 20, 2024
    affected >= 4.46.0, < 5.89.5fixed 5.89.5

    Ghost is a Node.js content management system. Improper authentication on some endpoints used for member actions would allow an attacker to perform member-only actions, and read member information. This security vulnerability is present in Ghost v4.46.0-v5.89.4. v5.89.5 contains a

  • CVE-2024-34451Jun 16, 2024
    affected < 5.110.4fixed 5.110.4

    Ghost through 5.85.1 allows remote attackers to bypass an authentication rate-limit protection mechanism by using many X-Forwarded-For headers with different values. NOTE: the vendor's position is that Ghost should be installed with a reverse proxy that allows only trusted X-Forw

  • CVE-2024-34448May 22, 2024
    affected < 5.82.0fixed 5.82.0

    Ghost before 5.82.0 allows CSV Injection during a member CSV export.

  • CVE-2024-34559HigMay 14, 2024
    affected < 1.5.0fixed 1.5.0

    Insertion of Sensitive Information into Log File vulnerability in Ghost Foundation Ghost.This issue affects Ghost: from n/a through 1.4.0.

  • CVE-2024-23724Feb 11, 2024
    affected < 5.82.11fixed 5.82.11

    Ghost through 5.76.0 allows stored XSS, and resultant privilege escalation in which a contributor can take over any account, via an SVG profile picture that contains JavaScript code to interact with the API on localhost TCP port 3001. NOTE: The discoverer reports that "The vendor

  • CVE-2024-23725Jan 21, 2024
    affected < 5.76.0fixed 5.76.0

    Ghost before 5.76.0 allows XSS via a post excerpt in excerpt.js. An XSS payload can be rendered in post summaries.

  • CVE-2023-40028Aug 15, 2023
    affected < 5.59.1fixed 5.59.1

    Ghost is an open source content management system. Versions prior to 5.59.1 are subject to a vulnerability which allows authenticated users to upload files that are symlinks. This can be exploited to perform an arbitrary file read of any file on the host operating system. Site ad

  • CVE-2023-31133May 8, 2023
    affected < 5.46.1fixed 5.46.1

    Ghost is an app for new-media creators with tools to build a website, publish content, send newsletters, and offer paid subscriptions to members. Prior to version 5.46.1, due to a lack of validation when filtering on the public API endpoints, it is possible to reveal private fiel

  • CVE-2023-32235May 5, 2023
    affected < 5.42.1fixed 5.42.1

    Ghost before 5.42.1 allows remote attackers to read arbitrary files within the active theme's folder via /assets/built%2F..%2F..%2F/ directory traversal. This occurs in frontend/web/middleware/static-theme.js.

  • CVE-2023-26510Mar 5, 2023
    affected >= 5.35.0, < 5.35.1fixed 5.35.1

    Ghost 5.35.0 allows authorization bypass: contributors can view draft posts of other users, which is arguably inconsistent with a security policy in which a contributor's draft can only be read by editors until published by an editor. NOTE: the vendor's position is that this beha

  • CVE-2022-47197Jan 19, 2023
    affected >= 5.9.4, < 5.9.5fixed 5.9.5

    An insecure default vulnerability exists in the Post Creation functionality of Ghost Foundation Ghost 5.9.4. Default installations of Ghost allow non-administrator users to inject arbitrary Javascript in posts, which allow privilege escalation to administrator via XSS. To trigger

Page 1 of 2