VYPR

Bitnami package

ghost

pkg:bitnami/ghost

Vulnerabilities (30)

  • CVE-2022-47196Jan 19, 2023
    affected >= 5.9.4, < 5.9.5fixed 5.9.5

    An insecure default vulnerability exists in the Post Creation functionality of Ghost Foundation Ghost 5.9.4. Default installations of Ghost allow non-administrator users to inject arbitrary Javascript in posts, which allow privilege escalation to administrator via XSS. To trigger

  • CVE-2022-47195Jan 19, 2023
    affected >= 5.9.4, < 5.9.5fixed 5.9.5

    An insecure default vulnerability exists in the Post Creation functionality of Ghost Foundation Ghost 5.9.4. Default installations of Ghost allow non-administrator users to inject arbitrary Javascript in posts, which allow privilege escalation to administrator via XSS. To trigger

  • CVE-2022-47194Jan 19, 2023
    affected >= 5.9.4, < 5.9.5fixed 5.9.5

    An insecure default vulnerability exists in the Post Creation functionality of Ghost Foundation Ghost 5.9.4. Default installations of Ghost allow non-administrator users to inject arbitrary Javascript in posts, which allow privilege escalation to administrator via XSS. To trigger

  • CVE-2022-41697Dec 23, 2022
    affected >= 5.9.4, < 5.9.5fixed 5.9.5

    A user enumeration vulnerability exists in the login functionality of Ghost Foundation Ghost 5.9.4. A specially-crafted HTTP request can lead to a disclosure of sensitive information. An attacker can send a series of HTTP requests to trigger this vulnerability.

  • CVE-2022-41654Dec 23, 2022
    affected >= 4.46.0, < 4.48.8fixed 4.48.8

    An authentication bypass vulnerability exists in the newsletter subscription functionality of Ghost Foundation Ghost 5.9.4. A specially-crafted HTTP request can lead to increased privileges. An attacker can send an HTTP request to trigger this vulnerability.

  • CVE-2022-28397Apr 12, 2022
    affected >= 4.42.0, < 4.42.1fixed 4.42.1

    An arbitrary file upload vulnerability in the file upload module of Ghost CMS v4.42.0 allows attackers to execute arbitrary code via a crafted file. NOTE: Vendor states as detailed in Ghost's security documentation, files can only be uploaded and published by trusted users, this

  • CVE-2022-27139Apr 12, 2022
    affected >= 4.39.0, < 4.39.1fixed 4.39.1

    An arbitrary file upload vulnerability in the file upload module of Ghost v4.39.0 allows attackers to execute arbitrary code via a crafted SVG file. NOTE: Vendor states that as outlined in Ghost's security documentation, upload of SVGs is only possible by trusted authenticated us

  • CVE-2021-39192Sep 3, 2021
    affected >= 4.0.0, < 4.10.0fixed 4.10.0

    Ghost is a Node.js content management system. An error in the implementation of the limits service between versions 4.0.0 and 4.9.4 allows all authenticated users (including contributors) to view admin-level API keys via the integrations API endpoint, leading to a privilege escal

  • CVE-2021-29484Apr 29, 2021
    affected >= 4.0.0, < 4.3.3fixed 4.3.3

    Ghost is a Node.js CMS. An unused endpoint added during the development of 4.0.0 has left sites vulnerable to untrusted users gaining access to Ghost Admin. Attackers can gain access by getting logged in users to click a link containing malicious code. Users do not need to enter

  • CVE-2020-8134Mar 20, 2020
    affected < 3.10.0fixed 3.10.0

    Server-side request forgery (SSRF) vulnerability in Ghost CMS < 3.10.0 allows an attacker to scan local or external network or otherwise interact with internal systems.

Page 2 of 2