Ghost Vulnerabilities
Comprehensive security vulnerability database for Ghost products
1
0
1
0
Severity Distribution
| Description | Vendor / Product | Exploit Status | |||
|---|---|---|---|---|---|
| CVE-2026-29784 | 8.8 | This vulnerability allows an attacker to potentially take over a Ghost site by exploiting weak protections during the login process, making it easier for them to use stolen session tokens. It primarily affects versions 5.101.6 to 6.19.2, and users should upgrade to version 6.19.3 or later to fix the issue. | ghostghost | Exploit Available | about 1 month agoMar 7, 2026 |
About Ghost Security
This page tracks all publicly disclosed security vulnerabilities (CVEs) affecting Ghost products. Our database is updated in real-time from the National Vulnerability Database (NVD) and enriched with exploit information from GitHub and other security research sources.
Each CVE listing includes CVSS severity scores, exploit availability status, AI-powered vulnerability summaries, and links to official patches and security advisories.