CVE-2026-29784
Plain English Summary
AI-powered analysis for quick understanding
This vulnerability allows an attacker to potentially take over a Ghost site by exploiting weak protections during the login process, making it easier for them to use stolen session tokens. It primarily affects versions 5.101.6 to 6.19.2, and users should upgrade to version 6.19.3 or later to fix the issue.
Technical Description
Ghost is a Node.js content management system. From version 5.101.6 to 6.19.2, incomplete CSRF protections around /session/verify made it possible to use OTCs in login sessions different from the requesting session. In some scenarios this might have made it easier for phishers to take over a Ghost site. This issue has been patched in version 6.19.3.
CVSS Vector Analysis
Vector String
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:HExploit Resources
Search for proof-of-concept code and exploit modules
Official References
Quick Information
Published
Mar 7, 2026
about 1 month ago
Last Modified
Mar 9, 2026
29 days ago
Vendor
ghost
Product
ghost